General

  • Target

    gdfdre.txt

  • Size

    1KB

  • Sample

    240817-1e6r6a1cmr

  • MD5

    7b97e788b45ddc9c904672c0a5f7336d

  • SHA1

    ea91aa392e8922096fd785f350e634ad71b11274

  • SHA256

    28cbe3f77d6cd8fd49bcdf7528b97d8c875f5236bbe03eae614e2009cc562c7c

  • SHA512

    b1d0704142edb05402834420d1a6485d3576d1475cbd0ec1c4c0b40e79ec703658bdca620b903671b11bad30f9878ee2eae97043ad97a943adca1eb809997f8b

Malware Config

Targets

    • Target

      gdfdre.txt

    • Size

      1KB

    • MD5

      7b97e788b45ddc9c904672c0a5f7336d

    • SHA1

      ea91aa392e8922096fd785f350e634ad71b11274

    • SHA256

      28cbe3f77d6cd8fd49bcdf7528b97d8c875f5236bbe03eae614e2009cc562c7c

    • SHA512

      b1d0704142edb05402834420d1a6485d3576d1475cbd0ec1c4c0b40e79ec703658bdca620b903671b11bad30f9878ee2eae97043ad97a943adca1eb809997f8b

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks