General

  • Target

    a6b0e2420e78fdc096c524becaffab099e2be18b4e26544d04759b5eacbae3d2

  • Size

    37KB

  • Sample

    240921-r8q45aybmn

  • MD5

    3f1d35dc116b80c65656e35b72aeb14f

  • SHA1

    102004f3e30680e10ddc5482c343a4c3288c57c1

  • SHA256

    a6b0e2420e78fdc096c524becaffab099e2be18b4e26544d04759b5eacbae3d2

  • SHA512

    d63fbcd869cd9a0ee98bad2acb9347dfbc8f79f268f61449db9f8b9ba8ce5d7d6b00b9dd2a989ee6c096269064835789faeabaad9f1fe7ff7a48f58db3960c3b

  • SSDEEP

    768:PIfPoElOIEvzMXqtwp/lttaL7HP4wIncLRdR5kP78a0RJW/aVn3:PuPoaYzMXqtGNttyUn01Q78a4Rl

Malware Config

Targets

    • Target

      a6b0e2420e78fdc096c524becaffab099e2be18b4e26544d04759b5eacbae3d2

    • Size

      37KB

    • MD5

      3f1d35dc116b80c65656e35b72aeb14f

    • SHA1

      102004f3e30680e10ddc5482c343a4c3288c57c1

    • SHA256

      a6b0e2420e78fdc096c524becaffab099e2be18b4e26544d04759b5eacbae3d2

    • SHA512

      d63fbcd869cd9a0ee98bad2acb9347dfbc8f79f268f61449db9f8b9ba8ce5d7d6b00b9dd2a989ee6c096269064835789faeabaad9f1fe7ff7a48f58db3960c3b

    • SSDEEP

      768:PIfPoElOIEvzMXqtwp/lttaL7HP4wIncLRdR5kP78a0RJW/aVn3:PuPoaYzMXqtGNttyUn01Q78a4Rl

    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks