General

  • Target

    c8073a63d83904cf8ac0062b054f0a6beaaef7ac1b8cbaa179a0ac194f14b3f8

  • Size

    2.0MB

  • Sample

    240821-zkjn5szckh

  • MD5

    a845a592008ec8dda1a82e2ce6c7da4f

  • SHA1

    c1c855fd489a6964a3c6d32e8ee53c74b16bf28b

  • SHA256

    c8073a63d83904cf8ac0062b054f0a6beaaef7ac1b8cbaa179a0ac194f14b3f8

  • SHA512

    ac2143b2c5b3ca10c9c3973c73101e8cdb1e48a6e7e2df110502d30f61468ba30d155ac1e32ee68e7c469723b69a78bc46c35e531b778d6496f66b9e6857428d

  • SSDEEP

    49152:kVAbwuGwKOco09gsJcxlV8fTguPOAItUIrhO5Ov:IApQx5+Mc27g9tfoMv

Malware Config

Targets

    • Target

      c8073a63d83904cf8ac0062b054f0a6beaaef7ac1b8cbaa179a0ac194f14b3f8

    • Size

      2.0MB

    • MD5

      a845a592008ec8dda1a82e2ce6c7da4f

    • SHA1

      c1c855fd489a6964a3c6d32e8ee53c74b16bf28b

    • SHA256

      c8073a63d83904cf8ac0062b054f0a6beaaef7ac1b8cbaa179a0ac194f14b3f8

    • SHA512

      ac2143b2c5b3ca10c9c3973c73101e8cdb1e48a6e7e2df110502d30f61468ba30d155ac1e32ee68e7c469723b69a78bc46c35e531b778d6496f66b9e6857428d

    • SSDEEP

      49152:kVAbwuGwKOco09gsJcxlV8fTguPOAItUIrhO5Ov:IApQx5+Mc27g9tfoMv

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks