General

  • Target

    d916da24044f588dd0cc4ecf0ada77a095dcd6e0e2c87fbd6acd492b18d8d13d

  • Size

    393KB

  • Sample

    240905-hpf1dawcrf

  • MD5

    4fe2e76877cbd77bcc6ecec98a02b62c

  • SHA1

    ffbe8cd3029976899756dbed3cd0ab76cbeb0bec

  • SHA256

    d916da24044f588dd0cc4ecf0ada77a095dcd6e0e2c87fbd6acd492b18d8d13d

  • SHA512

    b4966ece81787556ae5bf8d2b5f15d4f71c6bdb42576349809670883983176e7617e0c0a2de570dbe5c31087d3f56c6eeb4d6f9b1c857239013e7e22913b918e

  • SSDEEP

    6144:G+aX3LWP2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGuYF1mx:G+anahVy41

Malware Config

Targets

    • Target

      d916da24044f588dd0cc4ecf0ada77a095dcd6e0e2c87fbd6acd492b18d8d13d

    • Size

      393KB

    • MD5

      4fe2e76877cbd77bcc6ecec98a02b62c

    • SHA1

      ffbe8cd3029976899756dbed3cd0ab76cbeb0bec

    • SHA256

      d916da24044f588dd0cc4ecf0ada77a095dcd6e0e2c87fbd6acd492b18d8d13d

    • SHA512

      b4966ece81787556ae5bf8d2b5f15d4f71c6bdb42576349809670883983176e7617e0c0a2de570dbe5c31087d3f56c6eeb4d6f9b1c857239013e7e22913b918e

    • SSDEEP

      6144:G+aX3LWP2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGuYF1mx:G+anahVy41

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks