General

  • Target

    cf9581fa0310c489d72668c31ae804a8a5aa3c327a66dd0e09f75a964def8e47

  • Size

    2.0MB

  • Sample

    240813-28y5vawaqk

  • MD5

    cf41e67d43a2a9c7b1bd3bd6a30f1531

  • SHA1

    6ef15f875e5c6b659c9609839bd28b5d42d388d5

  • SHA256

    cf9581fa0310c489d72668c31ae804a8a5aa3c327a66dd0e09f75a964def8e47

  • SHA512

    d20558f5a8da97eb7d6bd9fd84ee5e42fbe4e52a9d9b21c900b0b6d638316e1948f077ff202168b0c6cc9cee06784514c8b0fad87fbd86672099b31434d05488

  • SSDEEP

    49152:DVAbwuGwKOco09gsJcxlV8fTguPOAItUIrhO5Ov:pApQx5+Mc27g9tfoMv

Malware Config

Targets

    • Target

      cf9581fa0310c489d72668c31ae804a8a5aa3c327a66dd0e09f75a964def8e47

    • Size

      2.0MB

    • MD5

      cf41e67d43a2a9c7b1bd3bd6a30f1531

    • SHA1

      6ef15f875e5c6b659c9609839bd28b5d42d388d5

    • SHA256

      cf9581fa0310c489d72668c31ae804a8a5aa3c327a66dd0e09f75a964def8e47

    • SHA512

      d20558f5a8da97eb7d6bd9fd84ee5e42fbe4e52a9d9b21c900b0b6d638316e1948f077ff202168b0c6cc9cee06784514c8b0fad87fbd86672099b31434d05488

    • SSDEEP

      49152:DVAbwuGwKOco09gsJcxlV8fTguPOAItUIrhO5Ov:pApQx5+Mc27g9tfoMv

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks