General

  • Target

    d79a9534de2a52ed22f6c77811f7d4b09c496409ae6e4966efeba7a1a52d315b

  • Size

    3.1MB

  • Sample

    240818-3pxy4svdjl

  • MD5

    bd4b0c982b3b6f39529d14df5ae77d77

  • SHA1

    0ccc28abca89ec37d92a49b399dba401db8f99ca

  • SHA256

    d79a9534de2a52ed22f6c77811f7d4b09c496409ae6e4966efeba7a1a52d315b

  • SHA512

    76f3c2147740a8dbdf21b6efef64c1ff11d496cf6ae5b15f306135d643eabc2abfec10d0f6bfede17f20a5243d5b441f921d814072e80fb0548226cf4a08bbd7

  • SSDEEP

    49152:TVAbw8VyRPkVwSdyKE6a8anqApzEVZnk8m0Uf89+zvi1QXsy4TpM+DWUl+n1aso:5A7VyRPS7MLq4ykF09+riyXWz6Ha

Malware Config

Targets

    • Target

      d79a9534de2a52ed22f6c77811f7d4b09c496409ae6e4966efeba7a1a52d315b

    • Size

      3.1MB

    • MD5

      bd4b0c982b3b6f39529d14df5ae77d77

    • SHA1

      0ccc28abca89ec37d92a49b399dba401db8f99ca

    • SHA256

      d79a9534de2a52ed22f6c77811f7d4b09c496409ae6e4966efeba7a1a52d315b

    • SHA512

      76f3c2147740a8dbdf21b6efef64c1ff11d496cf6ae5b15f306135d643eabc2abfec10d0f6bfede17f20a5243d5b441f921d814072e80fb0548226cf4a08bbd7

    • SSDEEP

      49152:TVAbw8VyRPkVwSdyKE6a8anqApzEVZnk8m0Uf89+zvi1QXsy4TpM+DWUl+n1aso:5A7VyRPS7MLq4ykF09+riyXWz6Ha

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks