General

  • Target

    a41b0406e8066063d78352a7e6f8d931729351db3d6e038850a95b7ef14db5e3

  • Size

    2.0MB

  • Sample

    240819-1c8tqs1bjp

  • MD5

    a66af9f935ed41466f0e56794805e180

  • SHA1

    7f1e09401bc42370048dc978d83d7ff6cab7cb0a

  • SHA256

    a41b0406e8066063d78352a7e6f8d931729351db3d6e038850a95b7ef14db5e3

  • SHA512

    5a4b25b7554c9b60fa0afb018739c1d11c8458a1093e07007c9604ef7e3eabac190e9e34c0530698d2644e38d11859ed01ab550cecc945ca085f8b219a90e048

  • SSDEEP

    49152:UVAbwuGwKOco09gsJcxlV8fTguPOAItUIrhO5Ov:4ApQx5+Mc27g9tfoMv

Malware Config

Targets

    • Target

      a41b0406e8066063d78352a7e6f8d931729351db3d6e038850a95b7ef14db5e3

    • Size

      2.0MB

    • MD5

      a66af9f935ed41466f0e56794805e180

    • SHA1

      7f1e09401bc42370048dc978d83d7ff6cab7cb0a

    • SHA256

      a41b0406e8066063d78352a7e6f8d931729351db3d6e038850a95b7ef14db5e3

    • SHA512

      5a4b25b7554c9b60fa0afb018739c1d11c8458a1093e07007c9604ef7e3eabac190e9e34c0530698d2644e38d11859ed01ab550cecc945ca085f8b219a90e048

    • SSDEEP

      49152:UVAbwuGwKOco09gsJcxlV8fTguPOAItUIrhO5Ov:4ApQx5+Mc27g9tfoMv

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks