General

  • Target

    28d594f08f04f09e8fa2e900d3c25a174a0b31b2e856dd38caa8e9196903d1c7

  • Size

    368KB

  • Sample

    240929-yeyens1epe

  • MD5

    6eaa207129506e7b8b5579eb67ce17f5

  • SHA1

    eb2f66e364f7b8741cff7a95e5b8cbd12f6ca483

  • SHA256

    28d594f08f04f09e8fa2e900d3c25a174a0b31b2e856dd38caa8e9196903d1c7

  • SHA512

    1e433e901ddbb519d05590a3bf7d88b8df7b577756ce406889db970485941e802465973aeb7ef10a75668de5fc8395ebe73116b922363ee7e3c4aef0630b7ced

  • SSDEEP

    6144:5JgmYA/nVA9JATAoQSHBjQP/sC94mrJx2XtjXmK6cAQJNElb6dPURN5Fpg:3gmYA/n0eDBjQPphdxmj2LcAEmlb+UpE

Malware Config

Targets

    • Target

      28d594f08f04f09e8fa2e900d3c25a174a0b31b2e856dd38caa8e9196903d1c7

    • Size

      368KB

    • MD5

      6eaa207129506e7b8b5579eb67ce17f5

    • SHA1

      eb2f66e364f7b8741cff7a95e5b8cbd12f6ca483

    • SHA256

      28d594f08f04f09e8fa2e900d3c25a174a0b31b2e856dd38caa8e9196903d1c7

    • SHA512

      1e433e901ddbb519d05590a3bf7d88b8df7b577756ce406889db970485941e802465973aeb7ef10a75668de5fc8395ebe73116b922363ee7e3c4aef0630b7ced

    • SSDEEP

      6144:5JgmYA/nVA9JATAoQSHBjQP/sC94mrJx2XtjXmK6cAQJNElb6dPURN5Fpg:3gmYA/n0eDBjQPphdxmj2LcAEmlb+UpE

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks