General

  • Target

    08a50a2765e00967dfee200266da665fcd91a670f03b7320240c155c9c4a5d21

  • Size

    3.5MB

  • Sample

    240903-xs8bcsvhpa

  • MD5

    da09890d7cf85c7e72c321b7795437a8

  • SHA1

    d1125d307bbc58c04ce931cdfa83c2f3ba1e69b5

  • SHA256

    08a50a2765e00967dfee200266da665fcd91a670f03b7320240c155c9c4a5d21

  • SHA512

    52a288f5e4480c7bf32c0493439c60696f731a456b7b7fd00584112275cf7f71c79ba04b4138c5feee759d3a1ef21f57e5bd9c72bdbc129aacdb9816d3dd9900

  • SSDEEP

    49152:vBC5tzuM0S2S5mLFEuVebedv9uNBb8AftK9qrO1LS9RhSq15vTNuHv/QXd9CQxMo:vkCFk/fUqrOiOc5z

Malware Config

Targets

    • Target

      08a50a2765e00967dfee200266da665fcd91a670f03b7320240c155c9c4a5d21

    • Size

      3.5MB

    • MD5

      da09890d7cf85c7e72c321b7795437a8

    • SHA1

      d1125d307bbc58c04ce931cdfa83c2f3ba1e69b5

    • SHA256

      08a50a2765e00967dfee200266da665fcd91a670f03b7320240c155c9c4a5d21

    • SHA512

      52a288f5e4480c7bf32c0493439c60696f731a456b7b7fd00584112275cf7f71c79ba04b4138c5feee759d3a1ef21f57e5bd9c72bdbc129aacdb9816d3dd9900

    • SSDEEP

      49152:vBC5tzuM0S2S5mLFEuVebedv9uNBb8AftK9qrO1LS9RhSq15vTNuHv/QXd9CQxMo:vkCFk/fUqrOiOc5z

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks