General

  • Target

    e4ceb12471e7d455195b738b9ff74da5466be487715cc1028272956d3102f385

  • Size

    3.1MB

  • Sample

    240819-1e3qha1brq

  • MD5

    edaf93ea7a1256e513fa27b94facd61a

  • SHA1

    60f7bdf250e78002835a237c4a96295c84af0bbc

  • SHA256

    e4ceb12471e7d455195b738b9ff74da5466be487715cc1028272956d3102f385

  • SHA512

    6fc1381fc5e15f67bac227995a7a248f4a5d500ed4417562cef1fb21eb6edd6edb7ffab2d0d9ba9f6e9734574ecfd9583009486b6cbf19f700947dd30a8a62df

  • SSDEEP

    49152:HVAbw8VyRPkVwSdyKE6a8anqApzEVZnk8m0Uf89+zvi1QXsy4TpM+DWUl+n1aso:1A7VyRPS7MLq4ykF09+riyXWz6Ha

Malware Config

Targets

    • Target

      e4ceb12471e7d455195b738b9ff74da5466be487715cc1028272956d3102f385

    • Size

      3.1MB

    • MD5

      edaf93ea7a1256e513fa27b94facd61a

    • SHA1

      60f7bdf250e78002835a237c4a96295c84af0bbc

    • SHA256

      e4ceb12471e7d455195b738b9ff74da5466be487715cc1028272956d3102f385

    • SHA512

      6fc1381fc5e15f67bac227995a7a248f4a5d500ed4417562cef1fb21eb6edd6edb7ffab2d0d9ba9f6e9734574ecfd9583009486b6cbf19f700947dd30a8a62df

    • SSDEEP

      49152:HVAbw8VyRPkVwSdyKE6a8anqApzEVZnk8m0Uf89+zvi1QXsy4TpM+DWUl+n1aso:1A7VyRPS7MLq4ykF09+riyXWz6Ha

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks