General

  • Target

    57e0a2a7b8ad6d080adf103e419fb40f9edb5111b74be5237c567a32c66aacba

  • Size

    94KB

  • Sample

    240912-2ptq1szemf

  • MD5

    00eef18516836dbec9d81e1c3c219469

  • SHA1

    f960643d15413b748fb9eab81a570770ed153a8f

  • SHA256

    57e0a2a7b8ad6d080adf103e419fb40f9edb5111b74be5237c567a32c66aacba

  • SHA512

    56682ca5a0acda105bb3e78385f9db5b236448d24a3d6422f50397084bef69bdd7a8330a1273beb52b2d3927edbad21dcb2cb5c9e66b65bde3f10e64460fd715

  • SSDEEP

    1536:2SSABNx6vb4RoI4mwRyAEd0tA6O+taBpDmuZfHEXmOoPIVK4:tSABNx6vb4RoI4mwRxO0tA6vGsa6cPIL

Malware Config

Targets

    • Target

      57e0a2a7b8ad6d080adf103e419fb40f9edb5111b74be5237c567a32c66aacba

    • Size

      94KB

    • MD5

      00eef18516836dbec9d81e1c3c219469

    • SHA1

      f960643d15413b748fb9eab81a570770ed153a8f

    • SHA256

      57e0a2a7b8ad6d080adf103e419fb40f9edb5111b74be5237c567a32c66aacba

    • SHA512

      56682ca5a0acda105bb3e78385f9db5b236448d24a3d6422f50397084bef69bdd7a8330a1273beb52b2d3927edbad21dcb2cb5c9e66b65bde3f10e64460fd715

    • SSDEEP

      1536:2SSABNx6vb4RoI4mwRyAEd0tA6O+taBpDmuZfHEXmOoPIVK4:tSABNx6vb4RoI4mwRxO0tA6vGsa6cPIL

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks