General

  • Target

    0b94bfb258c8df8bd43a24bd80df2f308c4c600c3f838abbe3ceae167518d316

  • Size

    2.0MB

  • Sample

    240819-aqly1swhnp

  • MD5

    69cd8506b212ccb5f7d5a04b2a2e0a5b

  • SHA1

    ad8bc9bf5b815df929886ea30dd2d31ec4523cc8

  • SHA256

    0b94bfb258c8df8bd43a24bd80df2f308c4c600c3f838abbe3ceae167518d316

  • SHA512

    d41573d1fb104860b60b72ace2d7f1a2716ab25f7c24a7210ac4a0c2292e2f3e634961dc6be4ad572a01e1f761095c4fed79bfd100ff1327ca6106a678d87af5

  • SSDEEP

    49152:lVAbwuGwKOco09gsJcxlV8fTguPOAItUIrhO5Ov:TApQx5+Mc27g9tfoMv

Malware Config

Targets

    • Target

      0b94bfb258c8df8bd43a24bd80df2f308c4c600c3f838abbe3ceae167518d316

    • Size

      2.0MB

    • MD5

      69cd8506b212ccb5f7d5a04b2a2e0a5b

    • SHA1

      ad8bc9bf5b815df929886ea30dd2d31ec4523cc8

    • SHA256

      0b94bfb258c8df8bd43a24bd80df2f308c4c600c3f838abbe3ceae167518d316

    • SHA512

      d41573d1fb104860b60b72ace2d7f1a2716ab25f7c24a7210ac4a0c2292e2f3e634961dc6be4ad572a01e1f761095c4fed79bfd100ff1327ca6106a678d87af5

    • SSDEEP

      49152:lVAbwuGwKOco09gsJcxlV8fTguPOAItUIrhO5Ov:TApQx5+Mc27g9tfoMv

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks