General

  • Target

    cb5dc439d0464903ff5a5c27a431807e33fff952fb99481d932b4c1a70db517b

  • Size

    3.1MB

  • Sample

    240823-aflv9svemg

  • MD5

    2996585b6e5258f6c5f0d3a8f0373d64

  • SHA1

    3cfe106369a044dc5ec72739f0e545b594c3c5e5

  • SHA256

    cb5dc439d0464903ff5a5c27a431807e33fff952fb99481d932b4c1a70db517b

  • SHA512

    cf30ab07b2e0f0103596639567832302bb5ba537e0ffc7543d523a7bfeef2b07de88bb609b04ea6c04c848044881da692c3980e8c5cb1104d0435aecb781c5ca

  • SSDEEP

    49152:8VAbwWYb12jHSVaHO3Vg3gfRv9yuqohghbpVOpmV4w1Z6nPI4gyJv:wAJY5oHhb0FqWgFQlw2w4gG

Malware Config

Targets

    • Target

      cb5dc439d0464903ff5a5c27a431807e33fff952fb99481d932b4c1a70db517b

    • Size

      3.1MB

    • MD5

      2996585b6e5258f6c5f0d3a8f0373d64

    • SHA1

      3cfe106369a044dc5ec72739f0e545b594c3c5e5

    • SHA256

      cb5dc439d0464903ff5a5c27a431807e33fff952fb99481d932b4c1a70db517b

    • SHA512

      cf30ab07b2e0f0103596639567832302bb5ba537e0ffc7543d523a7bfeef2b07de88bb609b04ea6c04c848044881da692c3980e8c5cb1104d0435aecb781c5ca

    • SSDEEP

      49152:8VAbwWYb12jHSVaHO3Vg3gfRv9yuqohghbpVOpmV4w1Z6nPI4gyJv:wAJY5oHhb0FqWgFQlw2w4gG

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks