General

  • Target

    d7e27fbdc1cb0b4b9db4e0f9a035638d5a897ca847de905761f622233dd10147

  • Size

    99KB

  • Sample

    241015-g7bmyazbmd

  • MD5

    b7d170faddbd8db16fa92f7f10558995

  • SHA1

    c848b4f8f2252c5437fd4693cd88d9238bd34b67

  • SHA256

    d7e27fbdc1cb0b4b9db4e0f9a035638d5a897ca847de905761f622233dd10147

  • SHA512

    8cb9a6f3042d4252e92d15839b300270595e99715c6d2a930545ddabbb1a05be6b27547d4b79f38e9e6d8dac513a7e199663b20c6b848e3512ea16c2bda22fcf

  • SSDEEP

    1536:HLe+Zk7qzUJBeLkbiT29dXkyapmebn4ddJZeY86iLflLJYEIs67rxo:HLe+aezUDbHXlLK4ddJMY86ipmns6S

Malware Config

Targets

    • Target

      d7e27fbdc1cb0b4b9db4e0f9a035638d5a897ca847de905761f622233dd10147

    • Size

      99KB

    • MD5

      b7d170faddbd8db16fa92f7f10558995

    • SHA1

      c848b4f8f2252c5437fd4693cd88d9238bd34b67

    • SHA256

      d7e27fbdc1cb0b4b9db4e0f9a035638d5a897ca847de905761f622233dd10147

    • SHA512

      8cb9a6f3042d4252e92d15839b300270595e99715c6d2a930545ddabbb1a05be6b27547d4b79f38e9e6d8dac513a7e199663b20c6b848e3512ea16c2bda22fcf

    • SSDEEP

      1536:HLe+Zk7qzUJBeLkbiT29dXkyapmebn4ddJZeY86iLflLJYEIs67rxo:HLe+aezUDbHXlLK4ddJMY86ipmns6S

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks