General

  • Target

    6205258238262bc732ae664e9aee3bd0N.exe

  • Size

    120KB

  • Sample

    240822-y43qpayell

  • MD5

    6205258238262bc732ae664e9aee3bd0

  • SHA1

    5dea4b03e387dc13f168cd98e866afa8c58075ff

  • SHA256

    a64f14f7064ea3fdcca18b6c65520fb20d2b9649f539c6399f5d87e030b72238

  • SHA512

    0f689ae42137d7a1e1ede059bd96b4257d3c1d8979eee1b8ce9205ba973741a668bf56a9dd91a408b226dd4d56c51876f39c350468da40da2d63d15a9e6deaa5

  • SSDEEP

    1536:aJUGCqveEeXdTeG4wu6oQuwEhQQWKXJR721rSTdk/cpAKdlaKrorkgA55i:aHFveEyTAK7VKXXS1GT7AKzaKrtP55i

Malware Config

Targets

    • Target

      6205258238262bc732ae664e9aee3bd0N.exe

    • Size

      120KB

    • MD5

      6205258238262bc732ae664e9aee3bd0

    • SHA1

      5dea4b03e387dc13f168cd98e866afa8c58075ff

    • SHA256

      a64f14f7064ea3fdcca18b6c65520fb20d2b9649f539c6399f5d87e030b72238

    • SHA512

      0f689ae42137d7a1e1ede059bd96b4257d3c1d8979eee1b8ce9205ba973741a668bf56a9dd91a408b226dd4d56c51876f39c350468da40da2d63d15a9e6deaa5

    • SSDEEP

      1536:aJUGCqveEeXdTeG4wu6oQuwEhQQWKXJR721rSTdk/cpAKdlaKrorkgA55i:aHFveEyTAK7VKXXS1GT7AKzaKrtP55i

    • Blocklisted process makes network request

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks