General

  • Target

    53c896e76187e2617f89da3049b3ed25280e8e115da78a0cfd094c575a1b7d58

  • Size

    97KB

  • Sample

    240901-g53nmstepk

  • MD5

    fdd5885d7022316875e54f458abab2b8

  • SHA1

    f1b0e292376d201aa2b60a6408c1365287565d3f

  • SHA256

    53c896e76187e2617f89da3049b3ed25280e8e115da78a0cfd094c575a1b7d58

  • SHA512

    6993e58076b645a3c1b9698686996410e6e2af4b96267a4b4f6ba5a1bd5b6b77041d1abb82d3c21808d0b34d225be698753df71970c7ce7b8604528b2ca9a78a

  • SSDEEP

    1536:Iche+Zk77RNzLiTOQf88qP2CsRdxgwGGCIOunToIfiWdN:Ise+aX3zvQf8l2CHRGgKTBfik

Malware Config

Targets

    • Target

      53c896e76187e2617f89da3049b3ed25280e8e115da78a0cfd094c575a1b7d58

    • Size

      97KB

    • MD5

      fdd5885d7022316875e54f458abab2b8

    • SHA1

      f1b0e292376d201aa2b60a6408c1365287565d3f

    • SHA256

      53c896e76187e2617f89da3049b3ed25280e8e115da78a0cfd094c575a1b7d58

    • SHA512

      6993e58076b645a3c1b9698686996410e6e2af4b96267a4b4f6ba5a1bd5b6b77041d1abb82d3c21808d0b34d225be698753df71970c7ce7b8604528b2ca9a78a

    • SSDEEP

      1536:Iche+Zk77RNzLiTOQf88qP2CsRdxgwGGCIOunToIfiWdN:Ise+aX3zvQf8l2CHRGgKTBfik

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks