General

  • Target

    79b669b8c50635f450e1fd5c1fe7043ab7536bd87deb86f3f3049c7bb88dfac1

  • Size

    394KB

  • Sample

    240829-dpd4ka1ckd

  • MD5

    5551a37a1f0ec94f28f1fbdcaf69a27c

  • SHA1

    c51c0776da0a8db87063ab5aa67ec6517dd516a6

  • SHA256

    79b669b8c50635f450e1fd5c1fe7043ab7536bd87deb86f3f3049c7bb88dfac1

  • SHA512

    3777077fa0bd00edfd928d8d3097d11f75efb60a774f6330d6cbc324e9b39298875bbeb9ec6aa5d0ce8ea4c3664e948ab6ada5f6bd7792ba05c4bf5c9fca4a58

  • SSDEEP

    6144:B46tGdyR43P2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGuYK:B3NRvahVy41

Malware Config

Targets

    • Target

      79b669b8c50635f450e1fd5c1fe7043ab7536bd87deb86f3f3049c7bb88dfac1

    • Size

      394KB

    • MD5

      5551a37a1f0ec94f28f1fbdcaf69a27c

    • SHA1

      c51c0776da0a8db87063ab5aa67ec6517dd516a6

    • SHA256

      79b669b8c50635f450e1fd5c1fe7043ab7536bd87deb86f3f3049c7bb88dfac1

    • SHA512

      3777077fa0bd00edfd928d8d3097d11f75efb60a774f6330d6cbc324e9b39298875bbeb9ec6aa5d0ce8ea4c3664e948ab6ada5f6bd7792ba05c4bf5c9fca4a58

    • SSDEEP

      6144:B46tGdyR43P2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGuYK:B3NRvahVy41

    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks