General

  • Target

    c210b2aa9f380a879cddb6ee08021795b54665a16232f3451ba4acc42f75d51b

  • Size

    2.6MB

  • Sample

    240920-tn781svgjg

  • MD5

    318d2c741656f06f7d7aa2da999a32f9

  • SHA1

    0522ded7028b5cabcacf251fa66bbaa97658eb14

  • SHA256

    c210b2aa9f380a879cddb6ee08021795b54665a16232f3451ba4acc42f75d51b

  • SHA512

    5f4ef057b74e27fde7970f714db3fbc9585ffe4ef3096c89297b4a892446c4790373dfe2c6b0c784c25869c0a85ba22d71627c2012b4b9011e46ac3f840c9fe0

  • SSDEEP

    12288:vj7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7Y:3cX

Malware Config

Targets

    • Target

      c210b2aa9f380a879cddb6ee08021795b54665a16232f3451ba4acc42f75d51b

    • Size

      2.6MB

    • MD5

      318d2c741656f06f7d7aa2da999a32f9

    • SHA1

      0522ded7028b5cabcacf251fa66bbaa97658eb14

    • SHA256

      c210b2aa9f380a879cddb6ee08021795b54665a16232f3451ba4acc42f75d51b

    • SHA512

      5f4ef057b74e27fde7970f714db3fbc9585ffe4ef3096c89297b4a892446c4790373dfe2c6b0c784c25869c0a85ba22d71627c2012b4b9011e46ac3f840c9fe0

    • SSDEEP

      12288:vj7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7j7Y:3cX

    • Modifies visibility of file extensions in Explorer

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks