General

  • Target

    d857534e513a1f5949a5629938baa91f21f8abb6f61f5d7e8553c7678cc0f3e1

  • Size

    2.0MB

  • Sample

    240818-2fn46s1fpm

  • MD5

    fd8bc7bf8b8789d4a7ce11e7bf39cfa3

  • SHA1

    53a9df4b2a63a9a21a292123aea8d9c29fb6b137

  • SHA256

    d857534e513a1f5949a5629938baa91f21f8abb6f61f5d7e8553c7678cc0f3e1

  • SHA512

    6cdcfeb6166eb6d764f107312fa2688cf16a1dbad4461bc1e9f37245fab1578f053429ba976b8f871b555496984cf14459120d15120e4e6ddc08d2c882434d19

  • SSDEEP

    49152:XVAbwuGwKOco09gsJcxlV8fTguPOAItUIrhO5Ov:FApQx5+Mc27g9tfoMv

Malware Config

Targets

    • Target

      d857534e513a1f5949a5629938baa91f21f8abb6f61f5d7e8553c7678cc0f3e1

    • Size

      2.0MB

    • MD5

      fd8bc7bf8b8789d4a7ce11e7bf39cfa3

    • SHA1

      53a9df4b2a63a9a21a292123aea8d9c29fb6b137

    • SHA256

      d857534e513a1f5949a5629938baa91f21f8abb6f61f5d7e8553c7678cc0f3e1

    • SHA512

      6cdcfeb6166eb6d764f107312fa2688cf16a1dbad4461bc1e9f37245fab1578f053429ba976b8f871b555496984cf14459120d15120e4e6ddc08d2c882434d19

    • SSDEEP

      49152:XVAbwuGwKOco09gsJcxlV8fTguPOAItUIrhO5Ov:FApQx5+Mc27g9tfoMv

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks