General

  • Target

    355abcbe9ae844014d51512ed61bfb9052aa17bb80853f3b1dd96546df146ec1

  • Size

    697KB

  • Sample

    241021-tmzv9aydrd

  • MD5

    4232b7b31903b1bac020acaa44eff7a4

  • SHA1

    2c53bc9b9db81b430ce8a2f18ceff191b309bab7

  • SHA256

    355abcbe9ae844014d51512ed61bfb9052aa17bb80853f3b1dd96546df146ec1

  • SHA512

    9a0e510e819062304bde020dcc025fe9b8f091514947261fcff293119125ea91af87968427dcb3ecc003d3294cf68ccb88830c09ab09ef0eb1c2c36d536b332a

  • SSDEEP

    12288:Djzr+jzr+jzr+jzr+jzr+jzr+jzr+jzr+jzr+jzr+jzr+jzr+jzr+jzr+jzrH:rOOOOOOOOOOOOOOT

Malware Config

Targets

    • Target

      355abcbe9ae844014d51512ed61bfb9052aa17bb80853f3b1dd96546df146ec1

    • Size

      697KB

    • MD5

      4232b7b31903b1bac020acaa44eff7a4

    • SHA1

      2c53bc9b9db81b430ce8a2f18ceff191b309bab7

    • SHA256

      355abcbe9ae844014d51512ed61bfb9052aa17bb80853f3b1dd96546df146ec1

    • SHA512

      9a0e510e819062304bde020dcc025fe9b8f091514947261fcff293119125ea91af87968427dcb3ecc003d3294cf68ccb88830c09ab09ef0eb1c2c36d536b332a

    • SSDEEP

      12288:Djzr+jzr+jzr+jzr+jzr+jzr+jzr+jzr+jzr+jzr+jzr+jzr+jzr+jzr+jzrH:rOOOOOOOOOOOOOOT

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks