General

  • Target

    ab700ee3dc7084d094fb2ea891ad9df2416bd78f0edde747661077a98af8f944

  • Size

    5.7MB

  • Sample

    241015-hecvzazeqg

  • MD5

    72562a6deeb04230d02b78b7d7714b31

  • SHA1

    26704770ddb1dd14c5bb1996dc8c896666eb7b1e

  • SHA256

    ab700ee3dc7084d094fb2ea891ad9df2416bd78f0edde747661077a98af8f944

  • SHA512

    11f1e4b39a2d3845aaa2771c464a3c88801f1b052dbf2e1ca51a445b3998059007cb8c7f8b8f3da24bd04b4773deba2cd7e47c92696be9aaa9f8204aa238a693

  • SSDEEP

    49152:PKPv94AEsKU8ggw1g+1CART5eBiyKS3EI3wybn20DCYIHvc8ixuZm9+fWsw6dTPn:PsKUgTH2M2m9UMpu1QfLczqssnKSk

Malware Config

Targets

    • Target

      ab700ee3dc7084d094fb2ea891ad9df2416bd78f0edde747661077a98af8f944

    • Size

      5.7MB

    • MD5

      72562a6deeb04230d02b78b7d7714b31

    • SHA1

      26704770ddb1dd14c5bb1996dc8c896666eb7b1e

    • SHA256

      ab700ee3dc7084d094fb2ea891ad9df2416bd78f0edde747661077a98af8f944

    • SHA512

      11f1e4b39a2d3845aaa2771c464a3c88801f1b052dbf2e1ca51a445b3998059007cb8c7f8b8f3da24bd04b4773deba2cd7e47c92696be9aaa9f8204aa238a693

    • SSDEEP

      49152:PKPv94AEsKU8ggw1g+1CART5eBiyKS3EI3wybn20DCYIHvc8ixuZm9+fWsw6dTPn:PsKUgTH2M2m9UMpu1QfLczqssnKSk

    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks