General

  • Target

    692f5d09691f927daed5acb19facd784e2efad6ffca6ac704815471eb4825337

  • Size

    2.0MB

  • Sample

    240825-261wna1aph

  • MD5

    f12c9c7af0a2e2265b6bba06d3892860

  • SHA1

    e27dc53283ab4314fa1e004cea101740aeb32d52

  • SHA256

    692f5d09691f927daed5acb19facd784e2efad6ffca6ac704815471eb4825337

  • SHA512

    81de4d25b7b51e609dd90e02cca3ef7604ab944f7f938bbf577144804938e180dd2c826c6af8934a17986ed72a08b7e624e172e83d2ba384c4cbbd228e93fe91

  • SSDEEP

    49152:kVAbwUQUFD1VR+zbTPDyoW53zJJfvRCYd60p9e9bldMi:IACQZGbo1HRCYd6b9x+

Malware Config

Targets

    • Target

      692f5d09691f927daed5acb19facd784e2efad6ffca6ac704815471eb4825337

    • Size

      2.0MB

    • MD5

      f12c9c7af0a2e2265b6bba06d3892860

    • SHA1

      e27dc53283ab4314fa1e004cea101740aeb32d52

    • SHA256

      692f5d09691f927daed5acb19facd784e2efad6ffca6ac704815471eb4825337

    • SHA512

      81de4d25b7b51e609dd90e02cca3ef7604ab944f7f938bbf577144804938e180dd2c826c6af8934a17986ed72a08b7e624e172e83d2ba384c4cbbd228e93fe91

    • SSDEEP

      49152:kVAbwUQUFD1VR+zbTPDyoW53zJJfvRCYd60p9e9bldMi:IACQZGbo1HRCYd6b9x+

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks