General

  • Target

    59baecffd7563139be317a2c7cb914dd1daac374b4c3f03d62e80ad84e84852f

  • Size

    5.1MB

  • Sample

    240814-ay6cmaxflr

  • MD5

    c329f6c4b8fdc0a0ea709bef27d72059

  • SHA1

    196a2f9112957467a40ef3d344aca47ac9a2b983

  • SHA256

    59baecffd7563139be317a2c7cb914dd1daac374b4c3f03d62e80ad84e84852f

  • SHA512

    3d8b10f4e0a3d7a59b821e81c9a36114d82f9265c0f2a11b64d5d5f19ef0f876a9725e39823b8d34fb12314435ce04d0e411f6a66372b764dc6ca25fd25b02cd

  • SSDEEP

    98304:60NFG6666666666666666666666666666666x666666666666666fwwwwwwwwwwT:/IOT2I5mTtpbvphIGZeXMxOjGe809wZV

Malware Config

Targets

    • Target

      59baecffd7563139be317a2c7cb914dd1daac374b4c3f03d62e80ad84e84852f

    • Size

      5.1MB

    • MD5

      c329f6c4b8fdc0a0ea709bef27d72059

    • SHA1

      196a2f9112957467a40ef3d344aca47ac9a2b983

    • SHA256

      59baecffd7563139be317a2c7cb914dd1daac374b4c3f03d62e80ad84e84852f

    • SHA512

      3d8b10f4e0a3d7a59b821e81c9a36114d82f9265c0f2a11b64d5d5f19ef0f876a9725e39823b8d34fb12314435ce04d0e411f6a66372b764dc6ca25fd25b02cd

    • SSDEEP

      98304:60NFG6666666666666666666666666666666x666666666666666fwwwwwwwwwwT:/IOT2I5mTtpbvphIGZeXMxOjGe809wZV

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks