General

  • Target

    c4890dd22ba0f166c1658c3022d97c90N.exe

  • Size

    110KB

  • Sample

    240820-hw2knasfrm

  • MD5

    c4890dd22ba0f166c1658c3022d97c90

  • SHA1

    eee80e851fa8bff597d8c3b788afb62e7362c428

  • SHA256

    6db1603ce68097dfdc5561726befd652bb9e5c7a7cf6a62dea379e174e512d45

  • SHA512

    fb932b9774f246b7575b9256e876e9b8aab281320641c839bdc8b283e8096a3f60df5660847aa6c7dcf4b48a2ea946f573533b5163c0e52f3b0ed5d250e1124c

  • SSDEEP

    3072:ZWrKR8W9Mj6yhPyKfXtAGsKG3ERrjjNB3+IQOren2UDgc:GjYKlAhUBVB3pQOargc

Malware Config

Targets

    • Target

      c4890dd22ba0f166c1658c3022d97c90N.exe

    • Size

      110KB

    • MD5

      c4890dd22ba0f166c1658c3022d97c90

    • SHA1

      eee80e851fa8bff597d8c3b788afb62e7362c428

    • SHA256

      6db1603ce68097dfdc5561726befd652bb9e5c7a7cf6a62dea379e174e512d45

    • SHA512

      fb932b9774f246b7575b9256e876e9b8aab281320641c839bdc8b283e8096a3f60df5660847aa6c7dcf4b48a2ea946f573533b5163c0e52f3b0ed5d250e1124c

    • SSDEEP

      3072:ZWrKR8W9Mj6yhPyKfXtAGsKG3ERrjjNB3+IQOren2UDgc:GjYKlAhUBVB3pQOargc

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks