General

  • Target

    cc08783acfdf13d0ea23dc016a1ff852490b9010946f59c3a3695db2a2801e3a

  • Size

    39KB

  • Sample

    240908-lp4m8ayepq

  • MD5

    cc072e09c229a4e81a01e973ec35c1a0

  • SHA1

    09d8c74275546a7e3c4ebccc38ac9458aef3f005

  • SHA256

    cc08783acfdf13d0ea23dc016a1ff852490b9010946f59c3a3695db2a2801e3a

  • SHA512

    efb13ca351d4a93a8e224872ae485f8e2c6cdb66058ffe65cc4b6acf32e7e4ab7e8125eb699cf7e61d888a01dff0906b37a26f45dc2c4eda9c05bef3c6adb508

  • SSDEEP

    768:A2O5RroZJ76739AzUJQ+CiiK1Cy6sgSq1cJpZ/i3:A2e+Zk7qzUJBC2KsgSMcJzi

Malware Config

Targets

    • Target

      cc08783acfdf13d0ea23dc016a1ff852490b9010946f59c3a3695db2a2801e3a

    • Size

      39KB

    • MD5

      cc072e09c229a4e81a01e973ec35c1a0

    • SHA1

      09d8c74275546a7e3c4ebccc38ac9458aef3f005

    • SHA256

      cc08783acfdf13d0ea23dc016a1ff852490b9010946f59c3a3695db2a2801e3a

    • SHA512

      efb13ca351d4a93a8e224872ae485f8e2c6cdb66058ffe65cc4b6acf32e7e4ab7e8125eb699cf7e61d888a01dff0906b37a26f45dc2c4eda9c05bef3c6adb508

    • SSDEEP

      768:A2O5RroZJ76739AzUJQ+CiiK1Cy6sgSq1cJpZ/i3:A2e+Zk7qzUJBC2KsgSMcJzi

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks