General

  • Target

    7d9a3ee3d5b4c4c7c05136364e5d67731cd5be4381befdb3261ea92c18b2854e

  • Size

    2.0MB

  • Sample

    240902-3hda5a1fqe

  • MD5

    bc6fd54ee83d63804e646e6bd3859926

  • SHA1

    c7e08712c04d64f298beed1159b92a24b27c5a1b

  • SHA256

    7d9a3ee3d5b4c4c7c05136364e5d67731cd5be4381befdb3261ea92c18b2854e

  • SHA512

    20e8f61cf20fec37cf2637a0a41daab16dacfa7d27233073424a04326c4e0fca85ebb9d5ba58b0e30f2fdae302244ea28c26f88f4cc8184ea77957700415bb7d

  • SSDEEP

    49152:AVAbwLvWVtw64YdUZBg+/yOaLCCxSwsgsO9evVO8AnrZ4EoedMij:sA4vLYK8MaBxSMcRAmEoe+K

Malware Config

Targets

    • Target

      7d9a3ee3d5b4c4c7c05136364e5d67731cd5be4381befdb3261ea92c18b2854e

    • Size

      2.0MB

    • MD5

      bc6fd54ee83d63804e646e6bd3859926

    • SHA1

      c7e08712c04d64f298beed1159b92a24b27c5a1b

    • SHA256

      7d9a3ee3d5b4c4c7c05136364e5d67731cd5be4381befdb3261ea92c18b2854e

    • SHA512

      20e8f61cf20fec37cf2637a0a41daab16dacfa7d27233073424a04326c4e0fca85ebb9d5ba58b0e30f2fdae302244ea28c26f88f4cc8184ea77957700415bb7d

    • SSDEEP

      49152:AVAbwLvWVtw64YdUZBg+/yOaLCCxSwsgsO9evVO8AnrZ4EoedMij:sA4vLYK8MaBxSMcRAmEoe+K

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks