General

  • Target

    9fc3ba66994a015c42e0e36300ae21ca9b04fea359add7a7d0f9b4e01d6663adN

  • Size

    98KB

  • Sample

    241016-xvq5vs1bqr

  • MD5

    927d6e7ef561e3f4a59f3478d9c01f90

  • SHA1

    a1b3bf053383b1fa926d511080e8c76f60f993f1

  • SHA256

    9fc3ba66994a015c42e0e36300ae21ca9b04fea359add7a7d0f9b4e01d6663ad

  • SHA512

    f681c116902a24a32dfb7ce8a945e82ae2d5132371c112673d4aefc2db3b96ece1f58a29ea1eeffb15bf44f2f4c6db173b42245fff22d3004a85f401917cb06b

  • SSDEEP

    1536:Eo3S0ZwRyAEd0tA6O+taBpDmuZfHEXmOoPIVK+S:EoiqwRxO0tA6vGsa6cPIVK+S

Malware Config

Targets

    • Target

      9fc3ba66994a015c42e0e36300ae21ca9b04fea359add7a7d0f9b4e01d6663adN

    • Size

      98KB

    • MD5

      927d6e7ef561e3f4a59f3478d9c01f90

    • SHA1

      a1b3bf053383b1fa926d511080e8c76f60f993f1

    • SHA256

      9fc3ba66994a015c42e0e36300ae21ca9b04fea359add7a7d0f9b4e01d6663ad

    • SHA512

      f681c116902a24a32dfb7ce8a945e82ae2d5132371c112673d4aefc2db3b96ece1f58a29ea1eeffb15bf44f2f4c6db173b42245fff22d3004a85f401917cb06b

    • SSDEEP

      1536:Eo3S0ZwRyAEd0tA6O+taBpDmuZfHEXmOoPIVK+S:EoiqwRxO0tA6vGsa6cPIVK+S

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks