General

  • Target

    58faaee4e16ba3ff9936d8758dab2e512230353face6febdcf129ab963e039a4

  • Size

    321KB

  • Sample

    240921-rnzkrswfje

  • MD5

    c9c9cad523a202bcdb77e3660fc39b41

  • SHA1

    31e407b3a16965a5e3a541044db7607fb902a3b4

  • SHA256

    58faaee4e16ba3ff9936d8758dab2e512230353face6febdcf129ab963e039a4

  • SHA512

    7eb53cfed4b262d414111d08953415c56b24674adba17f149905713a09753d5ef6b1c884fbed0e0d0695d486d9ef47182c18168708c193a819367061ad6b5e2c

  • SSDEEP

    1536:xHe+Zk77RNYjLBcae2/sJ9aJfXgY1zUTyr5hVM:xHe+aX38yae+XgTTSje

Malware Config

Targets

    • Target

      58faaee4e16ba3ff9936d8758dab2e512230353face6febdcf129ab963e039a4

    • Size

      321KB

    • MD5

      c9c9cad523a202bcdb77e3660fc39b41

    • SHA1

      31e407b3a16965a5e3a541044db7607fb902a3b4

    • SHA256

      58faaee4e16ba3ff9936d8758dab2e512230353face6febdcf129ab963e039a4

    • SHA512

      7eb53cfed4b262d414111d08953415c56b24674adba17f149905713a09753d5ef6b1c884fbed0e0d0695d486d9ef47182c18168708c193a819367061ad6b5e2c

    • SSDEEP

      1536:xHe+Zk77RNYjLBcae2/sJ9aJfXgY1zUTyr5hVM:xHe+aX38yae+XgTTSje

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks