General

  • Target

    46ad57fa90314d5c3fb9d2a7369fd900f2609ac63ebdf4e81ea8717e91e9ccc7

  • Size

    72KB

  • Sample

    240907-jdcz1sscmn

  • MD5

    012491b26a6f6cea7820ac1e1489405d

  • SHA1

    0d7e0b848f306d630a862235f1ed84a684d2e102

  • SHA256

    46ad57fa90314d5c3fb9d2a7369fd900f2609ac63ebdf4e81ea8717e91e9ccc7

  • SHA512

    2c0c01a49e73dbe23fe82ab4f6191446bfcebb85ce22f8db0cfc7301be3b71c6f5eb06ee26a641b4cd37d2d6cbf562df315de6fe26d021e4ea2be3e713530724

  • SSDEEP

    1536:Ate+Zk7qzUJBC2KsgSMcJzioiS4qz0XSW3iG47fy:Ate+aezUa6pBihS4qz3G47a

Malware Config

Targets

    • Target

      46ad57fa90314d5c3fb9d2a7369fd900f2609ac63ebdf4e81ea8717e91e9ccc7

    • Size

      72KB

    • MD5

      012491b26a6f6cea7820ac1e1489405d

    • SHA1

      0d7e0b848f306d630a862235f1ed84a684d2e102

    • SHA256

      46ad57fa90314d5c3fb9d2a7369fd900f2609ac63ebdf4e81ea8717e91e9ccc7

    • SHA512

      2c0c01a49e73dbe23fe82ab4f6191446bfcebb85ce22f8db0cfc7301be3b71c6f5eb06ee26a641b4cd37d2d6cbf562df315de6fe26d021e4ea2be3e713530724

    • SSDEEP

      1536:Ate+Zk7qzUJBC2KsgSMcJzioiS4qz0XSW3iG47fy:Ate+aezUa6pBihS4qz3G47a

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks