General

  • Target

    31300645371f90f83ca6aa058503fa7c2ba386f496ac181a6b287ba7ba1ea10e

  • Size

    1.9MB

  • Sample

    240812-j4lpvaxalf

  • MD5

    1ee73b17111ab0ffb2f62690310f4ada

  • SHA1

    3d3e2e367fe9b358bbb91e5cbcbe90250c220648

  • SHA256

    31300645371f90f83ca6aa058503fa7c2ba386f496ac181a6b287ba7ba1ea10e

  • SHA512

    811ecc63317c2636729026d95489f6f15053c2e52020a2260a7d6896f06aad39135b0194ddfc2bdd526ecb9d497cf3af90ce1c60b28ee4f2d39f2d14f67a4b36

  • SSDEEP

    24576:j1NDbbUMbRNjy8lZ2UFRTHD/mrM1e6sBiNhaYQBFq:vDbJbvjynUyCpx

Malware Config

Targets

    • Target

      31300645371f90f83ca6aa058503fa7c2ba386f496ac181a6b287ba7ba1ea10e

    • Size

      1.9MB

    • MD5

      1ee73b17111ab0ffb2f62690310f4ada

    • SHA1

      3d3e2e367fe9b358bbb91e5cbcbe90250c220648

    • SHA256

      31300645371f90f83ca6aa058503fa7c2ba386f496ac181a6b287ba7ba1ea10e

    • SHA512

      811ecc63317c2636729026d95489f6f15053c2e52020a2260a7d6896f06aad39135b0194ddfc2bdd526ecb9d497cf3af90ce1c60b28ee4f2d39f2d14f67a4b36

    • SSDEEP

      24576:j1NDbbUMbRNjy8lZ2UFRTHD/mrM1e6sBiNhaYQBFq:vDbJbvjynUyCpx

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks