General

  • Target

    a2e1d2feffd48980ae69ec4ff7271edab1e7fd7ad4e0b372abcdcb65f330602b

  • Size

    3.1MB

  • Sample

    240820-aaevrsshnb

  • MD5

    a8b7a85cb28f12feaa10afb434e62c76

  • SHA1

    dc40e52dd6e9762bc7df05c9a974f9e4f097256c

  • SHA256

    a2e1d2feffd48980ae69ec4ff7271edab1e7fd7ad4e0b372abcdcb65f330602b

  • SHA512

    2ce03cb8c5eae2686ee5416994c0d875adb47115a5bdc112b9510f2a7aab8a3ae1f2a2cbc551e5fda33a25a134364fc7ffabf58ac99d800eaff207df1b044e35

  • SSDEEP

    49152:bVAbwWYb12jHSVaHO3Vg3gfRv9yuqohghbpVOpmV4w1Z6nPI4gyJv:xAJY5oHhb0FqWgFQlw2w4gG

Malware Config

Targets

    • Target

      a2e1d2feffd48980ae69ec4ff7271edab1e7fd7ad4e0b372abcdcb65f330602b

    • Size

      3.1MB

    • MD5

      a8b7a85cb28f12feaa10afb434e62c76

    • SHA1

      dc40e52dd6e9762bc7df05c9a974f9e4f097256c

    • SHA256

      a2e1d2feffd48980ae69ec4ff7271edab1e7fd7ad4e0b372abcdcb65f330602b

    • SHA512

      2ce03cb8c5eae2686ee5416994c0d875adb47115a5bdc112b9510f2a7aab8a3ae1f2a2cbc551e5fda33a25a134364fc7ffabf58ac99d800eaff207df1b044e35

    • SSDEEP

      49152:bVAbwWYb12jHSVaHO3Vg3gfRv9yuqohghbpVOpmV4w1Z6nPI4gyJv:xAJY5oHhb0FqWgFQlw2w4gG

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks