General

  • Target

    c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f

  • Size

    285KB

  • Sample

    240907-ledn2swhpj

  • MD5

    7ddcb9f08defed78ade5024d31f1f920

  • SHA1

    d2475d6350f94b1ec60e755d3aa46840abfba784

  • SHA256

    c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f

  • SHA512

    d811f60d9b3a92c370dbd5d8683661b4f32e7be0394e6c84ce9458d116de6f6466987b5b3f991c481007b01c7640b82a30854e5b60336ff07114b7e277d0fa19

  • SSDEEP

    6144:Tl+aKMTi0+lfh+L5qe9T5q4GAFzWTBPMmC1UC6fOaU:Tl+aKMTi0uhMqe9ts2zWTpMmCG7W

Malware Config

Targets

    • Target

      c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f

    • Size

      285KB

    • MD5

      7ddcb9f08defed78ade5024d31f1f920

    • SHA1

      d2475d6350f94b1ec60e755d3aa46840abfba784

    • SHA256

      c1c0fa86d4280cbf2e8714ef27adfab7a7714eedf87785e2a6eba0cd0f4c9e4f

    • SHA512

      d811f60d9b3a92c370dbd5d8683661b4f32e7be0394e6c84ce9458d116de6f6466987b5b3f991c481007b01c7640b82a30854e5b60336ff07114b7e277d0fa19

    • SSDEEP

      6144:Tl+aKMTi0+lfh+L5qe9T5q4GAFzWTBPMmC1UC6fOaU:Tl+aKMTi0uhMqe9ts2zWTpMmCG7W

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks