General

  • Target

    b87259674b04b95364c89f90afd0ea8964f561786c70e3ab275ccd020ab15652

  • Size

    400KB

  • Sample

    241015-g7bypszbme

  • MD5

    19dc8c768a1b203fdf2e5f4294e45eb4

  • SHA1

    4ba84fa456d31183b269206425f2498122c5adb3

  • SHA256

    b87259674b04b95364c89f90afd0ea8964f561786c70e3ab275ccd020ab15652

  • SHA512

    7f6619a15779797af7ed7fe1d8185f89b14b281e310af4775e8aca54752cb625faed6a81c7eba384cf16fe685c216e1fbca5de2078f7a048f2c9f6f079f79647

  • SSDEEP

    6144:K+aezsP2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGuYF1moW:K+aQahVy41

Malware Config

Targets

    • Target

      b87259674b04b95364c89f90afd0ea8964f561786c70e3ab275ccd020ab15652

    • Size

      400KB

    • MD5

      19dc8c768a1b203fdf2e5f4294e45eb4

    • SHA1

      4ba84fa456d31183b269206425f2498122c5adb3

    • SHA256

      b87259674b04b95364c89f90afd0ea8964f561786c70e3ab275ccd020ab15652

    • SHA512

      7f6619a15779797af7ed7fe1d8185f89b14b281e310af4775e8aca54752cb625faed6a81c7eba384cf16fe685c216e1fbca5de2078f7a048f2c9f6f079f79647

    • SSDEEP

      6144:K+aezsP2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGuYF1moW:K+aQahVy41

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks