General

  • Target

    b95ff9cfd84e5e53cad29b1249f7fdb874e73257a0d628af7728200c4a54dd91

  • Size

    672KB

  • Sample

    240919-gx4kzavcql

  • MD5

    7b08da8947df9057718484434a6a637c

  • SHA1

    e80822f71ee884192a360d294b1ecdae341b67a2

  • SHA256

    b95ff9cfd84e5e53cad29b1249f7fdb874e73257a0d628af7728200c4a54dd91

  • SHA512

    735230e158f6bcaf6b86652a196708b946cc6c3e3674092b226e7ca2a44bc8e0772e0cc639e993a557ee25e88d7c3979cda5d9f6d5f39a6ef764f446eff0a0ef

  • SSDEEP

    6144:V+azbRZvSC9LRU0ySj14WH+JPb7uL8zRMnJjNhAp7SO8zRMnJjNhAp7S8FRcdEKw:V+azbvnPFlTz

Malware Config

Targets

    • Target

      b95ff9cfd84e5e53cad29b1249f7fdb874e73257a0d628af7728200c4a54dd91

    • Size

      672KB

    • MD5

      7b08da8947df9057718484434a6a637c

    • SHA1

      e80822f71ee884192a360d294b1ecdae341b67a2

    • SHA256

      b95ff9cfd84e5e53cad29b1249f7fdb874e73257a0d628af7728200c4a54dd91

    • SHA512

      735230e158f6bcaf6b86652a196708b946cc6c3e3674092b226e7ca2a44bc8e0772e0cc639e993a557ee25e88d7c3979cda5d9f6d5f39a6ef764f446eff0a0ef

    • SSDEEP

      6144:V+azbRZvSC9LRU0ySj14WH+JPb7uL8zRMnJjNhAp7SO8zRMnJjNhAp7S8FRcdEKw:V+azbvnPFlTz

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks