General

  • Target

    1e3711838b34a5eaf25f548c3a9a7f10b01310ccfbb14289e3ab323cdc1de907

  • Size

    149KB

  • Sample

    240909-qw4c9ashrh

  • MD5

    2015ef4889e5004d4356963c9c69df53

  • SHA1

    9c2c567fd3e26f7494b1d40f69c47ed5c18f9e95

  • SHA256

    1e3711838b34a5eaf25f548c3a9a7f10b01310ccfbb14289e3ab323cdc1de907

  • SHA512

    df5a26b55caa0eb63fee6e057649cdc5d7643b98425699ca87236e22b3cfe417cae95095dcd04435259f129eabce89fc62b06d4a62b54bcec62b8dbbd30b7c02

  • SSDEEP

    3072:K4we+a/mZWXyaiedMbrN6pnoXPBsr5Zrt:Jl+a/SNaPM4loo5Z5

Malware Config

Targets

    • Target

      1e3711838b34a5eaf25f548c3a9a7f10b01310ccfbb14289e3ab323cdc1de907

    • Size

      149KB

    • MD5

      2015ef4889e5004d4356963c9c69df53

    • SHA1

      9c2c567fd3e26f7494b1d40f69c47ed5c18f9e95

    • SHA256

      1e3711838b34a5eaf25f548c3a9a7f10b01310ccfbb14289e3ab323cdc1de907

    • SHA512

      df5a26b55caa0eb63fee6e057649cdc5d7643b98425699ca87236e22b3cfe417cae95095dcd04435259f129eabce89fc62b06d4a62b54bcec62b8dbbd30b7c02

    • SSDEEP

      3072:K4we+a/mZWXyaiedMbrN6pnoXPBsr5Zrt:Jl+a/SNaPM4loo5Z5

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks