General

  • Target

    2687092e7a9b15afc19f3016000851de2fc5d4b8f31b1b8f39382491d4afa881N

  • Size

    184KB

  • Sample

    241013-q22fvatgrn

  • MD5

    ec006a397a4533f645f0d00c7a042df0

  • SHA1

    31cc4ddb4021c0d0c090fc04c2d4eef343447bac

  • SHA256

    2687092e7a9b15afc19f3016000851de2fc5d4b8f31b1b8f39382491d4afa881

  • SHA512

    e44ad97b445c4a55e06da38c3fa6ddc0fca8c3ec018e4bb4f97566b002c1f3e5329bef732515cb93c3b3d9fa11e304c241bd6ce539fb29c30efcd0d9e24926b3

  • SSDEEP

    3072:iv5xXA/ezfIIY9Jm+j9ZY4nfDPzdDHsQGjFRZRvD0BP++pZAEjKZjYHp7UOr:iE5I4PvYyfDP5r0FR770BaFZjYHdFr

Malware Config

Targets

    • Target

      2687092e7a9b15afc19f3016000851de2fc5d4b8f31b1b8f39382491d4afa881N

    • Size

      184KB

    • MD5

      ec006a397a4533f645f0d00c7a042df0

    • SHA1

      31cc4ddb4021c0d0c090fc04c2d4eef343447bac

    • SHA256

      2687092e7a9b15afc19f3016000851de2fc5d4b8f31b1b8f39382491d4afa881

    • SHA512

      e44ad97b445c4a55e06da38c3fa6ddc0fca8c3ec018e4bb4f97566b002c1f3e5329bef732515cb93c3b3d9fa11e304c241bd6ce539fb29c30efcd0d9e24926b3

    • SSDEEP

      3072:iv5xXA/ezfIIY9Jm+j9ZY4nfDPzdDHsQGjFRZRvD0BP++pZAEjKZjYHp7UOr:iE5I4PvYyfDP5r0FR770BaFZjYHdFr

    • Blocklisted process makes network request

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks