General

  • Target

    9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6

  • Size

    164KB

  • Sample

    240829-k5pcsstcqa

  • MD5

    8ec91fc6bf847cf20018483ae9a62497

  • SHA1

    2dfb3d334833d3a7ca2025e37746e38f6e3e4fe8

  • SHA256

    9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6

  • SHA512

    4049d932563c5b75733bca3c6a6c087b8128e3d666c98a2e63a062fed624abaaaca2c905c05e424604dc626d6e371697d13d00e1bf2f4437f2f2417019c18299

  • SSDEEP

    3072:BGhfZ4ZHUI899djmMGWBgh1002J8emEu3T7TO+9Z9sTOVrZzxVxU:ohMHyYWBW1Wu3rOOuOVr8

Malware Config

Targets

    • Target

      9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6

    • Size

      164KB

    • MD5

      8ec91fc6bf847cf20018483ae9a62497

    • SHA1

      2dfb3d334833d3a7ca2025e37746e38f6e3e4fe8

    • SHA256

      9faf05832806269072a3a2511e4568f8d83d5b93b74075a19bef670e0fabaef6

    • SHA512

      4049d932563c5b75733bca3c6a6c087b8128e3d666c98a2e63a062fed624abaaaca2c905c05e424604dc626d6e371697d13d00e1bf2f4437f2f2417019c18299

    • SSDEEP

      3072:BGhfZ4ZHUI899djmMGWBgh1002J8emEu3T7TO+9Z9sTOVrZzxVxU:ohMHyYWBW1Wu3rOOuOVr8

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks