General

  • Target

    542f22696e54bbd055928ae64c17edc90f6e2e15a81dc8da3f05c8c08e5466b7

  • Size

    5.7MB

  • Sample

    240925-q6mhgsydrq

  • MD5

    a3f75a09fc71891675dfa9c46ba0b689

  • SHA1

    853cd1c055a2813b2e8c54570a9770a120b82fc3

  • SHA256

    542f22696e54bbd055928ae64c17edc90f6e2e15a81dc8da3f05c8c08e5466b7

  • SHA512

    a2a6cb66e8c5f06c4add557f41f1ba1e36b24e37fbd7ca40df1a1455df10e3be00b77943757d29b7dd7c9abf5e02043ab2514ed921857cbe94fadd78e31f29c7

  • SSDEEP

    49152:Hd+Pv94AEsKU8ggw1g+1CART5eBiyKS3EI3wybn20DCYIHvc8ixuZm9+fWsw6dTP:HdAKUgTH2M2m9UMpu1QfLczqssnKSk

Malware Config

Targets

    • Target

      542f22696e54bbd055928ae64c17edc90f6e2e15a81dc8da3f05c8c08e5466b7

    • Size

      5.7MB

    • MD5

      a3f75a09fc71891675dfa9c46ba0b689

    • SHA1

      853cd1c055a2813b2e8c54570a9770a120b82fc3

    • SHA256

      542f22696e54bbd055928ae64c17edc90f6e2e15a81dc8da3f05c8c08e5466b7

    • SHA512

      a2a6cb66e8c5f06c4add557f41f1ba1e36b24e37fbd7ca40df1a1455df10e3be00b77943757d29b7dd7c9abf5e02043ab2514ed921857cbe94fadd78e31f29c7

    • SSDEEP

      49152:Hd+Pv94AEsKU8ggw1g+1CART5eBiyKS3EI3wybn20DCYIHvc8ixuZm9+fWsw6dTP:HdAKUgTH2M2m9UMpu1QfLczqssnKSk

    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks