General

  • Target

    7ddf1b25f8bc342738de008e43121011a9c81b7d4185e0050ca6f8272a793c57

  • Size

    3.1MB

  • Sample

    240823-3lnw2atejd

  • MD5

    93bfa1d37421d63d881e65c877aa6d17

  • SHA1

    10e3dc25143080772434a4ae5151a025bc4b03c3

  • SHA256

    7ddf1b25f8bc342738de008e43121011a9c81b7d4185e0050ca6f8272a793c57

  • SHA512

    6f68acafb9a31fba0e46b99cc49362cb5df7ee9cb3fabb3aa155a11069070a38784179f3d3bdb362e57d155104c8c1b047407dd26ed6c4d84ae3bb7aab1edb68

  • SSDEEP

    49152:fVAbwUJqsNL8BVGwpFVAsHMCL2VYDY1iSWf/E3/gWi7+pIT0i6gIpOcbbNyWT:dARdO1zV9MCyV60af/E38ovgIEfS

Malware Config

Targets

    • Target

      7ddf1b25f8bc342738de008e43121011a9c81b7d4185e0050ca6f8272a793c57

    • Size

      3.1MB

    • MD5

      93bfa1d37421d63d881e65c877aa6d17

    • SHA1

      10e3dc25143080772434a4ae5151a025bc4b03c3

    • SHA256

      7ddf1b25f8bc342738de008e43121011a9c81b7d4185e0050ca6f8272a793c57

    • SHA512

      6f68acafb9a31fba0e46b99cc49362cb5df7ee9cb3fabb3aa155a11069070a38784179f3d3bdb362e57d155104c8c1b047407dd26ed6c4d84ae3bb7aab1edb68

    • SSDEEP

      49152:fVAbwUJqsNL8BVGwpFVAsHMCL2VYDY1iSWf/E3/gWi7+pIT0i6gIpOcbbNyWT:dARdO1zV9MCyV60af/E38ovgIEfS

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks