General

  • Target

    385d461617d262248c356158a76fed56aacfef0ab424d266f6ee768da02ceee6

  • Size

    393KB

  • Sample

    241017-rrrdkathmr

  • MD5

    f8ee050926a28462406018b98468913b

  • SHA1

    635081507478ee061bbc6b75a191a3394d952a10

  • SHA256

    385d461617d262248c356158a76fed56aacfef0ab424d266f6ee768da02ceee6

  • SHA512

    f5a0f62c533460ba6f3cee937a5fff45d125f4fdbd440a9496e12286601f0525f64ae375976cc8e7ed25c0f04e75fde2e1061ef58539747d5a64138e5f1ac024

  • SSDEEP

    6144:T13cP2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGuYF1moHXG:T13RahVy41

Malware Config

Targets

    • Target

      385d461617d262248c356158a76fed56aacfef0ab424d266f6ee768da02ceee6

    • Size

      393KB

    • MD5

      f8ee050926a28462406018b98468913b

    • SHA1

      635081507478ee061bbc6b75a191a3394d952a10

    • SHA256

      385d461617d262248c356158a76fed56aacfef0ab424d266f6ee768da02ceee6

    • SHA512

      f5a0f62c533460ba6f3cee937a5fff45d125f4fdbd440a9496e12286601f0525f64ae375976cc8e7ed25c0f04e75fde2e1061ef58539747d5a64138e5f1ac024

    • SSDEEP

      6144:T13cP2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGuYF1moHXG:T13RahVy41

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks