General

  • Target

    custom.png

  • Size

    1KB

  • Sample

    240821-e77z2atfkr

  • MD5

    fb8e076da4654f9c8850772f2a9fa44c

  • SHA1

    9cd88e3d8be9e6f52f464c668bf9b8a7e4eee0ed

  • SHA256

    f0ab9844fb8df96c19c773db17af28d95fe97ddcc485da4ccb03015668d326db

  • SHA512

    29b9112f8c029ba87f89c734255787e973e37c4c33dab60845b9392a2f8845c0bea80a7938a24a8d610de89b30ba2835cd199903be4b04cbbab00174a18de46f

Malware Config

Targets

    • Target

      custom.png

    • Size

      1KB

    • MD5

      fb8e076da4654f9c8850772f2a9fa44c

    • SHA1

      9cd88e3d8be9e6f52f464c668bf9b8a7e4eee0ed

    • SHA256

      f0ab9844fb8df96c19c773db17af28d95fe97ddcc485da4ccb03015668d326db

    • SHA512

      29b9112f8c029ba87f89c734255787e973e37c4c33dab60845b9392a2f8845c0bea80a7938a24a8d610de89b30ba2835cd199903be4b04cbbab00174a18de46f

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks