General

  • Target

    USBDeviceDriver.exe

  • Size

    1.6MB

  • Sample

    240904-xgh74awdme

  • MD5

    fee54f87474275f2bc374279c195d026

  • SHA1

    b314612f0231c090d18acf63c53ab61ce76688db

  • SHA256

    0dfcf543021f44d3f4ab6ce524457d1970ca59661d04b7567f2ad296f7cd79ef

  • SHA512

    13028a801028ece7352e0b103dba0c867bd2201985687f0ad99204d4296698d13ac9fcbff7cf6865af57ddbb0ab1d1dadc15ecc0b6ec96c541a98468e7916ce0

  • SSDEEP

    24576:WKi2Q9NXw2/wPOjdGxY2rqkqjVnlqud+/2P+A+ZecdyFoBkkAnexMrdgLR9:WNTq24GjdGSiqkqXfd+/9AqYanieKd2

Malware Config

Targets

    • Target

      USBDeviceDriver.exe

    • Size

      1.6MB

    • MD5

      fee54f87474275f2bc374279c195d026

    • SHA1

      b314612f0231c090d18acf63c53ab61ce76688db

    • SHA256

      0dfcf543021f44d3f4ab6ce524457d1970ca59661d04b7567f2ad296f7cd79ef

    • SHA512

      13028a801028ece7352e0b103dba0c867bd2201985687f0ad99204d4296698d13ac9fcbff7cf6865af57ddbb0ab1d1dadc15ecc0b6ec96c541a98468e7916ce0

    • SSDEEP

      24576:WKi2Q9NXw2/wPOjdGxY2rqkqjVnlqud+/2P+A+ZecdyFoBkkAnexMrdgLR9:WNTq24GjdGSiqkqXfd+/9AqYanieKd2

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks