General

  • Target

    e32cea08daa5e4354faf4f7684678d32a636053cf9b9b40f103a4a0c0ffdb1fe

  • Size

    577KB

  • Sample

    241005-2waxgszdne

  • MD5

    595d05feffd38a710923d2fd0accd0b4

  • SHA1

    13a403d4504f1ab3857dba2f84cb41e4615adc74

  • SHA256

    e32cea08daa5e4354faf4f7684678d32a636053cf9b9b40f103a4a0c0ffdb1fe

  • SHA512

    8a92e6a8e461eac54099588fa3922f6716ecb1ee17820a115a765b089a7a031f6e0c3fcb22b70fbb31b3cb9d7dfa5a9a8ced3c3c61b6a5d0ee2652c6443b3817

  • SSDEEP

    6144:9+aX364E7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4t0BHk:9+aq7a3iwbihym2g7XO3LWUQfh4Co

Malware Config

Targets

    • Target

      e32cea08daa5e4354faf4f7684678d32a636053cf9b9b40f103a4a0c0ffdb1fe

    • Size

      577KB

    • MD5

      595d05feffd38a710923d2fd0accd0b4

    • SHA1

      13a403d4504f1ab3857dba2f84cb41e4615adc74

    • SHA256

      e32cea08daa5e4354faf4f7684678d32a636053cf9b9b40f103a4a0c0ffdb1fe

    • SHA512

      8a92e6a8e461eac54099588fa3922f6716ecb1ee17820a115a765b089a7a031f6e0c3fcb22b70fbb31b3cb9d7dfa5a9a8ced3c3c61b6a5d0ee2652c6443b3817

    • SSDEEP

      6144:9+aX364E7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4t0BHk:9+aq7a3iwbihym2g7XO3LWUQfh4Co

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks