General

  • Target

    9eb1dedb06ad324fa20eafd63f0c524d64c9d7dd35f82c3f5941ca7e4bdda1f5

  • Size

    2.0MB

  • Sample

    240818-2kasca1hml

  • MD5

    a73ada52ab638344d25af10e9c4bec01

  • SHA1

    53c4b09f461417adb296b59875d584b218f6abc4

  • SHA256

    9eb1dedb06ad324fa20eafd63f0c524d64c9d7dd35f82c3f5941ca7e4bdda1f5

  • SHA512

    4c17dbf56ab3adb31474aecaa3c2a063841e3450f3e5a9f0f671f918b8aa77b880f7e1ec457492ac5741cd5e8a78fd08b22958c82d0fc85207c5c2058bb643ed

  • SSDEEP

    49152:OVAbwuGwKOco09gsJcxlV8fTguPOAItUIrhO5Ov:aApQx5+Mc27g9tfoMv

Malware Config

Targets

    • Target

      9eb1dedb06ad324fa20eafd63f0c524d64c9d7dd35f82c3f5941ca7e4bdda1f5

    • Size

      2.0MB

    • MD5

      a73ada52ab638344d25af10e9c4bec01

    • SHA1

      53c4b09f461417adb296b59875d584b218f6abc4

    • SHA256

      9eb1dedb06ad324fa20eafd63f0c524d64c9d7dd35f82c3f5941ca7e4bdda1f5

    • SHA512

      4c17dbf56ab3adb31474aecaa3c2a063841e3450f3e5a9f0f671f918b8aa77b880f7e1ec457492ac5741cd5e8a78fd08b22958c82d0fc85207c5c2058bb643ed

    • SSDEEP

      49152:OVAbwuGwKOco09gsJcxlV8fTguPOAItUIrhO5Ov:aApQx5+Mc27g9tfoMv

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks