General

  • Target

    c54ffe36d4ff9963550e5b09aca22c5b81f7c0b4f79e3ffb4305600ec30d63d9

  • Size

    368KB

  • Sample

    240921-sgcm4aybra

  • MD5

    1cac3250a4638030391d7f1a92f8369e

  • SHA1

    290f1d22d8f1e3c53f13410301355730a9f47bcf

  • SHA256

    c54ffe36d4ff9963550e5b09aca22c5b81f7c0b4f79e3ffb4305600ec30d63d9

  • SHA512

    8370ee69a3760922f824df46ec891e2bfa214b6a47ebccd32452ec5c9bf43474cd871dfbd3494d22912b7772adf8526f31b92ee2ccca46c7fa52945a1b9d51b2

  • SSDEEP

    6144:c+aX38PzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:c+a8LU66b5zhVymA/XSRh

Malware Config

Targets

    • Target

      c54ffe36d4ff9963550e5b09aca22c5b81f7c0b4f79e3ffb4305600ec30d63d9

    • Size

      368KB

    • MD5

      1cac3250a4638030391d7f1a92f8369e

    • SHA1

      290f1d22d8f1e3c53f13410301355730a9f47bcf

    • SHA256

      c54ffe36d4ff9963550e5b09aca22c5b81f7c0b4f79e3ffb4305600ec30d63d9

    • SHA512

      8370ee69a3760922f824df46ec891e2bfa214b6a47ebccd32452ec5c9bf43474cd871dfbd3494d22912b7772adf8526f31b92ee2ccca46c7fa52945a1b9d51b2

    • SSDEEP

      6144:c+aX38PzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:c+a8LU66b5zhVymA/XSRh

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks