General

  • Target

    b73f2aa4a0c79f2aa246e90b74d35ab44bb1609e9a28255272e367accdd8d542

  • Size

    5.1MB

  • Sample

    240814-asg3vasemg

  • MD5

    515e980a2d5cbe019c3c62cab0b621dd

  • SHA1

    f594261538f0ccd3c623a40216f99c56f1d425fd

  • SHA256

    b73f2aa4a0c79f2aa246e90b74d35ab44bb1609e9a28255272e367accdd8d542

  • SHA512

    3ad4029d45ca1be9ae2403b951ef0eaf745e51be715ceeafdbaf50987ce51053bd072ad744dd203ce5c619eb5517ce6a91f6887881640b665bc94e5010e40b54

  • SSDEEP

    98304:i0NFG6666666666666666666666666666666x666666666666666fwwwwwwwwwwT:XIOT2I5mTtpbvphIGZeXMxOjGe809wZV

Malware Config

Targets

    • Target

      b73f2aa4a0c79f2aa246e90b74d35ab44bb1609e9a28255272e367accdd8d542

    • Size

      5.1MB

    • MD5

      515e980a2d5cbe019c3c62cab0b621dd

    • SHA1

      f594261538f0ccd3c623a40216f99c56f1d425fd

    • SHA256

      b73f2aa4a0c79f2aa246e90b74d35ab44bb1609e9a28255272e367accdd8d542

    • SHA512

      3ad4029d45ca1be9ae2403b951ef0eaf745e51be715ceeafdbaf50987ce51053bd072ad744dd203ce5c619eb5517ce6a91f6887881640b665bc94e5010e40b54

    • SSDEEP

      98304:i0NFG6666666666666666666666666666666x666666666666666fwwwwwwwwwwT:XIOT2I5mTtpbvphIGZeXMxOjGe809wZV

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks