General

  • Target

    ede84a9ed746bb1cdbc0055668fce5a0N.exe

  • Size

    52KB

  • Sample

    240905-f6taxsvdld

  • MD5

    ede84a9ed746bb1cdbc0055668fce5a0

  • SHA1

    0cf89df96b62e6ca9e4583af2117dfaa925a24d4

  • SHA256

    c83068d19b310bec49ffe172284fb55e64ce889263116c337a6ad332e9d88b70

  • SHA512

    75e2d2c8954df2c53e9035b428be39534899c529eef1ae4d4c157d6e3fe48b50b7f6857b1b9a45e389646fbd0217b28a3e8535612bb523cf9803bb8661c3d436

  • SSDEEP

    768:FlQ4hrvaEGU4aikqykezg2XpfYejYioRoKJyl5:fLhE1Dezg2ZfYLomw5

Malware Config

Targets

    • Target

      ede84a9ed746bb1cdbc0055668fce5a0N.exe

    • Size

      52KB

    • MD5

      ede84a9ed746bb1cdbc0055668fce5a0

    • SHA1

      0cf89df96b62e6ca9e4583af2117dfaa925a24d4

    • SHA256

      c83068d19b310bec49ffe172284fb55e64ce889263116c337a6ad332e9d88b70

    • SHA512

      75e2d2c8954df2c53e9035b428be39534899c529eef1ae4d4c157d6e3fe48b50b7f6857b1b9a45e389646fbd0217b28a3e8535612bb523cf9803bb8661c3d436

    • SSDEEP

      768:FlQ4hrvaEGU4aikqykezg2XpfYejYioRoKJyl5:fLhE1Dezg2ZfYLomw5

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks