General

  • Target

    1d7b96caedbcc7204cb6083eba69195f9a332ee1229197b214c08dfad3e5eca7

  • Size

    92KB

  • Sample

    241012-k44fbsxflr

  • MD5

    42d9d589d10e471d138fc9a21f8fc5b3

  • SHA1

    2547ebd285dde6ad0f7e6007b6e099e980ed0aa9

  • SHA256

    1d7b96caedbcc7204cb6083eba69195f9a332ee1229197b214c08dfad3e5eca7

  • SHA512

    5fcbff4d1cd3d5567d7b46b518e7b77688cfb5fc4d424e4cd5c6a4e5cd4ae62e62f33eb1560b783e3d535336a4cb6568d5cd806d6a910ce4c15094e3ede78a25

  • SSDEEP

    1536:Skcx1aeg1viBxvCOt3cyapmebn4ddJZeY86iLflLJYEIs67rxo:Skf9otNLK4ddJMY86ipmns6S

Malware Config

Targets

    • Target

      1d7b96caedbcc7204cb6083eba69195f9a332ee1229197b214c08dfad3e5eca7

    • Size

      92KB

    • MD5

      42d9d589d10e471d138fc9a21f8fc5b3

    • SHA1

      2547ebd285dde6ad0f7e6007b6e099e980ed0aa9

    • SHA256

      1d7b96caedbcc7204cb6083eba69195f9a332ee1229197b214c08dfad3e5eca7

    • SHA512

      5fcbff4d1cd3d5567d7b46b518e7b77688cfb5fc4d424e4cd5c6a4e5cd4ae62e62f33eb1560b783e3d535336a4cb6568d5cd806d6a910ce4c15094e3ede78a25

    • SSDEEP

      1536:Skcx1aeg1viBxvCOt3cyapmebn4ddJZeY86iLflLJYEIs67rxo:Skf9otNLK4ddJMY86ipmns6S

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks