General

  • Target

    44ad1badd5d434eaf91f616d66a43ece39072a306080ca4bf7931aeb8c72877a

  • Size

    2.0MB

  • Sample

    240820-bces8azaql

  • MD5

    3c40097a7d1ca3826ce3070383e27a04

  • SHA1

    32a55f64af28b0597ea71eb8efa9d196c338680f

  • SHA256

    44ad1badd5d434eaf91f616d66a43ece39072a306080ca4bf7931aeb8c72877a

  • SHA512

    5be3ffd9c6480081c859fb7553e6f41ea5b4fa9b1f9a4648b2d469f953baefa523f203b29795c9c818f8a925969869b88821fe7abf53edb3dd9d7089232ae6e7

  • SSDEEP

    49152:7VAbwuGwKOco09gsJcxlV8fTguPOAItUIrhO5Ov:RApQx5+Mc27g9tfoMv

Malware Config

Targets

    • Target

      44ad1badd5d434eaf91f616d66a43ece39072a306080ca4bf7931aeb8c72877a

    • Size

      2.0MB

    • MD5

      3c40097a7d1ca3826ce3070383e27a04

    • SHA1

      32a55f64af28b0597ea71eb8efa9d196c338680f

    • SHA256

      44ad1badd5d434eaf91f616d66a43ece39072a306080ca4bf7931aeb8c72877a

    • SHA512

      5be3ffd9c6480081c859fb7553e6f41ea5b4fa9b1f9a4648b2d469f953baefa523f203b29795c9c818f8a925969869b88821fe7abf53edb3dd9d7089232ae6e7

    • SSDEEP

      49152:7VAbwuGwKOco09gsJcxlV8fTguPOAItUIrhO5Ov:RApQx5+Mc27g9tfoMv

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks