General

  • Target

    b91e7e40313b9f419bb70a5aa1a1751c9353a02a05f85c48e08ba7ac07b87385

  • Size

    154KB

  • Sample

    241014-dehn1a1cqq

  • MD5

    21d8688f46a1927c5fefe9d5eaaacb9d

  • SHA1

    f77c71ca1655d08f6bffd4460236e1352e72b1d1

  • SHA256

    b91e7e40313b9f419bb70a5aa1a1751c9353a02a05f85c48e08ba7ac07b87385

  • SHA512

    82c38cf1389a9fc5f5b23e2ff54ddbd0eb44c196e067e282a294183ffe69109b53b4977abcdc2846962c00ad03fa96da9d43a4df78f17ef9d2622762b3fd3188

  • SSDEEP

    1536:+fxvtgixq7OstjzjW6ZdjtETzR77i11GAbRp0BGiEA0O0oB:+HIa6KTdNAbzSGiN0OJB

Malware Config

Targets

    • Target

      b91e7e40313b9f419bb70a5aa1a1751c9353a02a05f85c48e08ba7ac07b87385

    • Size

      154KB

    • MD5

      21d8688f46a1927c5fefe9d5eaaacb9d

    • SHA1

      f77c71ca1655d08f6bffd4460236e1352e72b1d1

    • SHA256

      b91e7e40313b9f419bb70a5aa1a1751c9353a02a05f85c48e08ba7ac07b87385

    • SHA512

      82c38cf1389a9fc5f5b23e2ff54ddbd0eb44c196e067e282a294183ffe69109b53b4977abcdc2846962c00ad03fa96da9d43a4df78f17ef9d2622762b3fd3188

    • SSDEEP

      1536:+fxvtgixq7OstjzjW6ZdjtETzR77i11GAbRp0BGiEA0O0oB:+HIa6KTdNAbzSGiN0OJB

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks