General

  • Target

    da277dbbb9a83da7d03b2abe2462ebf9ed606a64a7dc4ce3a425b7b939f9b17f

  • Size

    264KB

  • Sample

    240914-3dw8fasgjq

  • MD5

    c31ac8f84f6cab4e929a81f98b942085

  • SHA1

    7a1410de4243ac6b8216a4a78bf062b5d69fb5d9

  • SHA256

    da277dbbb9a83da7d03b2abe2462ebf9ed606a64a7dc4ce3a425b7b939f9b17f

  • SHA512

    a261103e2cad90a075f0b8d4f3db08e42c4b157a34e815ce4b66ce2894e7bdcf1c3f1b6f4f9e0f0e38b773255ea3752a929d39c750b6af72fa5c37ad0ec24066

  • SSDEEP

    1536:21psrz8GvnGxILFkbeumIkA39xSZW175V7UZQJ0UjsWpcdVO4Mqg+aJRaCAd1uhg:2G8a4LRkgUA1nQZwFGVO4Mqg+WDY

Malware Config

Targets

    • Target

      da277dbbb9a83da7d03b2abe2462ebf9ed606a64a7dc4ce3a425b7b939f9b17f

    • Size

      264KB

    • MD5

      c31ac8f84f6cab4e929a81f98b942085

    • SHA1

      7a1410de4243ac6b8216a4a78bf062b5d69fb5d9

    • SHA256

      da277dbbb9a83da7d03b2abe2462ebf9ed606a64a7dc4ce3a425b7b939f9b17f

    • SHA512

      a261103e2cad90a075f0b8d4f3db08e42c4b157a34e815ce4b66ce2894e7bdcf1c3f1b6f4f9e0f0e38b773255ea3752a929d39c750b6af72fa5c37ad0ec24066

    • SSDEEP

      1536:21psrz8GvnGxILFkbeumIkA39xSZW175V7UZQJ0UjsWpcdVO4Mqg+aJRaCAd1uhg:2G8a4LRkgUA1nQZwFGVO4Mqg+WDY

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks