General

  • Target

    54acad0b64e41a74ebd0320d1045d28d7eb39f1efd3fd0d9927060bc2f94ee84

  • Size

    3.1MB

  • Sample

    240823-2elmna1aqb

  • MD5

    3bb74342c7690774305d4d45e01b2e5d

  • SHA1

    a10ecb252c269209edb7495fa906b0e52e217d37

  • SHA256

    54acad0b64e41a74ebd0320d1045d28d7eb39f1efd3fd0d9927060bc2f94ee84

  • SHA512

    641edd9af9c4877f45cc5126b639845bce501fbf4907d81685ebdbb8086ee900d70c8fc62ae83df21cb99c70690d9c5acc74045dad6831b622753475767ac8d5

  • SSDEEP

    49152:mVAbwUJqsNL8BVGwpFVAsHMCL2VYDY1iSWf/E3/gWi7+pIT0i6gIpOcbbNyWT:iARdO1zV9MCyV60af/E38ovgIEfS

Malware Config

Targets

    • Target

      54acad0b64e41a74ebd0320d1045d28d7eb39f1efd3fd0d9927060bc2f94ee84

    • Size

      3.1MB

    • MD5

      3bb74342c7690774305d4d45e01b2e5d

    • SHA1

      a10ecb252c269209edb7495fa906b0e52e217d37

    • SHA256

      54acad0b64e41a74ebd0320d1045d28d7eb39f1efd3fd0d9927060bc2f94ee84

    • SHA512

      641edd9af9c4877f45cc5126b639845bce501fbf4907d81685ebdbb8086ee900d70c8fc62ae83df21cb99c70690d9c5acc74045dad6831b622753475767ac8d5

    • SSDEEP

      49152:mVAbwUJqsNL8BVGwpFVAsHMCL2VYDY1iSWf/E3/gWi7+pIT0i6gIpOcbbNyWT:iARdO1zV9MCyV60af/E38ovgIEfS

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks