General

  • Target

    f353ed320dc6450ab045a87159e27aedcc6aed61da701f4e650162e61b5a21c0

  • Size

    1.1MB

  • Sample

    240820-jjjdzsthml

  • MD5

    319215a954e352f08e3950a31ce899cc

  • SHA1

    82da16f0625650a6d4615bb2671f468844ca2431

  • SHA256

    f353ed320dc6450ab045a87159e27aedcc6aed61da701f4e650162e61b5a21c0

  • SHA512

    dbce9e7f0247e5e8d9840d263c5e09767f53864caebd11deb028c488d7ae8d341d68a593002e4f867308c4ae5bed7b9b25f0dc7d5778ca63b1e34e04dea43be5

  • SSDEEP

    24576:EBuXT9T+w6zY8v5a2FZ7WDpk2Kvfd5nP6Wp8zrMBThYBjv:EBuZ6zY8/7WDaDvfd5iQ8zoBThojv

Malware Config

Targets

    • Target

      f353ed320dc6450ab045a87159e27aedcc6aed61da701f4e650162e61b5a21c0

    • Size

      1.1MB

    • MD5

      319215a954e352f08e3950a31ce899cc

    • SHA1

      82da16f0625650a6d4615bb2671f468844ca2431

    • SHA256

      f353ed320dc6450ab045a87159e27aedcc6aed61da701f4e650162e61b5a21c0

    • SHA512

      dbce9e7f0247e5e8d9840d263c5e09767f53864caebd11deb028c488d7ae8d341d68a593002e4f867308c4ae5bed7b9b25f0dc7d5778ca63b1e34e04dea43be5

    • SSDEEP

      24576:EBuXT9T+w6zY8v5a2FZ7WDpk2Kvfd5nP6Wp8zrMBThYBjv:EBuZ6zY8/7WDaDvfd5iQ8zoBThojv

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks