General

  • Target

    3d5fbd0f94d3f6dc91a200ad59e8582483d28af6e9c6c2fe840ac47857a795e6

  • Size

    3.1MB

  • Sample

    240814-b2hamstgqd

  • MD5

    b620a55a86dfd1c41fba7742f0a0f842

  • SHA1

    ef2ac8ac171f6bb30b5de704a1f489bb4a935057

  • SHA256

    3d5fbd0f94d3f6dc91a200ad59e8582483d28af6e9c6c2fe840ac47857a795e6

  • SHA512

    9b676a1fb5fb1ddb6afee16c07f564e73bd77edec5a29c867fa79c1aef0a592e6d4189edb9dfd44180873800b4a138f4235cacf33dacd07d4343277a59cbee7e

  • SSDEEP

    49152:jVAbw8VyRPkVwSdyKE6a8anqApzEVZnk8m0Uf89+zvi1QXsy4TpM+DWUl+n1aso:JA7VyRPS7MLq4ykF09+riyXWz6Ha

Malware Config

Targets

    • Target

      3d5fbd0f94d3f6dc91a200ad59e8582483d28af6e9c6c2fe840ac47857a795e6

    • Size

      3.1MB

    • MD5

      b620a55a86dfd1c41fba7742f0a0f842

    • SHA1

      ef2ac8ac171f6bb30b5de704a1f489bb4a935057

    • SHA256

      3d5fbd0f94d3f6dc91a200ad59e8582483d28af6e9c6c2fe840ac47857a795e6

    • SHA512

      9b676a1fb5fb1ddb6afee16c07f564e73bd77edec5a29c867fa79c1aef0a592e6d4189edb9dfd44180873800b4a138f4235cacf33dacd07d4343277a59cbee7e

    • SSDEEP

      49152:jVAbw8VyRPkVwSdyKE6a8anqApzEVZnk8m0Uf89+zvi1QXsy4TpM+DWUl+n1aso:JA7VyRPS7MLq4ykF09+riyXWz6Ha

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks