General

  • Target

    2412f04bccafc2bd9701bf2a8ab024d1fd979225811a3a23c0ab85ab55d9cabf

  • Size

    141KB

  • Sample

    240914-rseq6ayfqd

  • MD5

    87df19ba332c5ffc6472ed0bfc462548

  • SHA1

    2f798edf0e3dbb95bfb5111e79c3e43b8912f65f

  • SHA256

    2412f04bccafc2bd9701bf2a8ab024d1fd979225811a3a23c0ab85ab55d9cabf

  • SHA512

    285142c9f6f6cd6e812f158ca6202433c0bcd36db782cb234da0c031a0a4cc051fef41a841871ae79c65dd8ecf38dce53a20513b84eb5662b9fc5a809090300e

  • SSDEEP

    3072:PqaY46tGNttyJQ7KR6sRYHKreCC0XUq2yiqzv6z4AXrB4APHCv:y46tGdyrYHKreQ32hlBG

Malware Config

Targets

    • Target

      2412f04bccafc2bd9701bf2a8ab024d1fd979225811a3a23c0ab85ab55d9cabf

    • Size

      141KB

    • MD5

      87df19ba332c5ffc6472ed0bfc462548

    • SHA1

      2f798edf0e3dbb95bfb5111e79c3e43b8912f65f

    • SHA256

      2412f04bccafc2bd9701bf2a8ab024d1fd979225811a3a23c0ab85ab55d9cabf

    • SHA512

      285142c9f6f6cd6e812f158ca6202433c0bcd36db782cb234da0c031a0a4cc051fef41a841871ae79c65dd8ecf38dce53a20513b84eb5662b9fc5a809090300e

    • SSDEEP

      3072:PqaY46tGNttyJQ7KR6sRYHKreCC0XUq2yiqzv6z4AXrB4APHCv:y46tGdyrYHKreQ32hlBG

    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks