General

  • Target

    9c3e34fd10fc2c6a16c26bc9fba236b0N

  • Size

    258KB

  • Sample

    240908-zn6yvaxcqc

  • MD5

    9c3e34fd10fc2c6a16c26bc9fba236b0

  • SHA1

    8dd8c8acf18246ac231406542c5f455043458820

  • SHA256

    ef75a21e2217eb15b0110de317ab2666cf9e2c28afe4765a16e75106225086a4

  • SHA512

    bcbde633dd58875cde1f5c53f790cf1813ff240bfc15ee63d441f1c58485e910a53f3430c8cbbf37a9aaa3640218a0bc07bf13254a5460de8dffcd7f3ec9003f

  • SSDEEP

    6144:l+aezCpBoQZbO5JCSZT0wwla4G13CmdxLzI9LTB5xnmT:l+aVbuJcfcXbz0Tfxo

Malware Config

Targets

    • Target

      9c3e34fd10fc2c6a16c26bc9fba236b0N

    • Size

      258KB

    • MD5

      9c3e34fd10fc2c6a16c26bc9fba236b0

    • SHA1

      8dd8c8acf18246ac231406542c5f455043458820

    • SHA256

      ef75a21e2217eb15b0110de317ab2666cf9e2c28afe4765a16e75106225086a4

    • SHA512

      bcbde633dd58875cde1f5c53f790cf1813ff240bfc15ee63d441f1c58485e910a53f3430c8cbbf37a9aaa3640218a0bc07bf13254a5460de8dffcd7f3ec9003f

    • SSDEEP

      6144:l+aezCpBoQZbO5JCSZT0wwla4G13CmdxLzI9LTB5xnmT:l+aVbuJcfcXbz0Tfxo

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks