General

  • Target

    7c9f3c7f0a82db60905b7dab8bcbe9fb7492a7ea6c34137c6c89461dc7725537

  • Size

    66KB

  • Sample

    240921-shr46sycpd

  • MD5

    9d2b72abd8d0fade5bdca3c1109ce4c5

  • SHA1

    fcee37365cdc82a91ae115beaf503c8f3457aa5b

  • SHA256

    7c9f3c7f0a82db60905b7dab8bcbe9fb7492a7ea6c34137c6c89461dc7725537

  • SHA512

    8d3b89fd3ef6a23bedd229d7daed68051644f530c02aceca3d5a8b0f89160d5f09554ab78ed3bde8e2f4356f994b1b78ec6d3e73113d27b5f502a34556e54628

  • SSDEEP

    1536:PuPoaYzMXqtGNttyUn01Q78a4RE/MF0Vz5gpEaDoc:PhaY46tGNttyJQ7KRE/W0VzBaDP

Malware Config

Targets

    • Target

      7c9f3c7f0a82db60905b7dab8bcbe9fb7492a7ea6c34137c6c89461dc7725537

    • Size

      66KB

    • MD5

      9d2b72abd8d0fade5bdca3c1109ce4c5

    • SHA1

      fcee37365cdc82a91ae115beaf503c8f3457aa5b

    • SHA256

      7c9f3c7f0a82db60905b7dab8bcbe9fb7492a7ea6c34137c6c89461dc7725537

    • SHA512

      8d3b89fd3ef6a23bedd229d7daed68051644f530c02aceca3d5a8b0f89160d5f09554ab78ed3bde8e2f4356f994b1b78ec6d3e73113d27b5f502a34556e54628

    • SSDEEP

      1536:PuPoaYzMXqtGNttyUn01Q78a4RE/MF0Vz5gpEaDoc:PhaY46tGNttyJQ7KRE/W0VzBaDP

    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks