General

  • Target

    59f56ee7db522a7ed54f16f96ff3c887229a70d7058c6bd8af689c21f2b7f131

  • Size

    73KB

  • Sample

    240909-qxx8matale

  • MD5

    97936a11b2fe040d500955b72a2d8e58

  • SHA1

    5d4c1e09c740e7eb4660ce7b3a33cb635d7a9c86

  • SHA256

    59f56ee7db522a7ed54f16f96ff3c887229a70d7058c6bd8af689c21f2b7f131

  • SHA512

    a90dbfd36edafc8aa689064b673d02b2d570c7975386cbddecaea9651a06788559746d154302ce5ee2f32f15df715cf485fc64a133ca535e7a18fd495a55725b

  • SSDEEP

    1536:8Ze+Zk7VJbwlYXjPrsqrZMYR5p8wrZoEV0JuRUFyMOaHQ1l:8Ze+azbRPrlr9RXFGk0JXXOeQ

Malware Config

Targets

    • Target

      59f56ee7db522a7ed54f16f96ff3c887229a70d7058c6bd8af689c21f2b7f131

    • Size

      73KB

    • MD5

      97936a11b2fe040d500955b72a2d8e58

    • SHA1

      5d4c1e09c740e7eb4660ce7b3a33cb635d7a9c86

    • SHA256

      59f56ee7db522a7ed54f16f96ff3c887229a70d7058c6bd8af689c21f2b7f131

    • SHA512

      a90dbfd36edafc8aa689064b673d02b2d570c7975386cbddecaea9651a06788559746d154302ce5ee2f32f15df715cf485fc64a133ca535e7a18fd495a55725b

    • SSDEEP

      1536:8Ze+Zk7VJbwlYXjPrsqrZMYR5p8wrZoEV0JuRUFyMOaHQ1l:8Ze+azbRPrlr9RXFGk0JXXOeQ

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks