General

  • Target

    c614605e127fabad1d114b2fb3da573bce409aa322e885f11b6793402da700fb

  • Size

    397KB

  • Sample

    240921-qk9qwstgle

  • MD5

    d949734f20f79ec417d3e7fb6449d02e

  • SHA1

    e14a4a9a431a9be9108e85e0c25b0a271e806a97

  • SHA256

    c614605e127fabad1d114b2fb3da573bce409aa322e885f11b6793402da700fb

  • SHA512

    bcd836a9b8e4fadc1c4078e23028fb19bba49e0afec2f63f8054565a14fb917dfa22e6d2b07eea906ec1381f1831411c76157fec934f9d591031b19382c2bb05

  • SSDEEP

    6144:x+arnDXYQ/BWJjmpgtBZQZKQj8p3jyb7HREd4SZ1tzLbF:x+arDXYJmSTZwYp32bY4qtDF

Malware Config

Targets

    • Target

      c614605e127fabad1d114b2fb3da573bce409aa322e885f11b6793402da700fb

    • Size

      397KB

    • MD5

      d949734f20f79ec417d3e7fb6449d02e

    • SHA1

      e14a4a9a431a9be9108e85e0c25b0a271e806a97

    • SHA256

      c614605e127fabad1d114b2fb3da573bce409aa322e885f11b6793402da700fb

    • SHA512

      bcd836a9b8e4fadc1c4078e23028fb19bba49e0afec2f63f8054565a14fb917dfa22e6d2b07eea906ec1381f1831411c76157fec934f9d591031b19382c2bb05

    • SSDEEP

      6144:x+arnDXYQ/BWJjmpgtBZQZKQj8p3jyb7HREd4SZ1tzLbF:x+arDXYJmSTZwYp32bY4qtDF

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks