General

  • Target

    a722c27e446fa41b793d580a6d7a8dc77caaf5fdca2f3b11548352c6aafa2fffN

  • Size

    2.1MB

  • Sample

    241026-f9bv2szhrh

  • MD5

    74573b9998f7be88f2ce84fd58f61eb0

  • SHA1

    af4db545d5f33e505451554cbdd7ca269da2df7a

  • SHA256

    a722c27e446fa41b793d580a6d7a8dc77caaf5fdca2f3b11548352c6aafa2fff

  • SHA512

    8bc9edd08d7c2d91809afee671c3d2941f23549b6042e0eb4600025dc96bfed994ffb536d6eefd907b2ebb92937dc48cdc3681525fc0d87182ff135efca8aae8

  • SSDEEP

    49152:/VAbwqtogFa7ghSPjUrNIPq6rlSfccB8n5OeqX3rYMPff:9ANtogF/hdGJxE7eqX0e

Malware Config

Targets

    • Target

      a722c27e446fa41b793d580a6d7a8dc77caaf5fdca2f3b11548352c6aafa2fffN

    • Size

      2.1MB

    • MD5

      74573b9998f7be88f2ce84fd58f61eb0

    • SHA1

      af4db545d5f33e505451554cbdd7ca269da2df7a

    • SHA256

      a722c27e446fa41b793d580a6d7a8dc77caaf5fdca2f3b11548352c6aafa2fff

    • SHA512

      8bc9edd08d7c2d91809afee671c3d2941f23549b6042e0eb4600025dc96bfed994ffb536d6eefd907b2ebb92937dc48cdc3681525fc0d87182ff135efca8aae8

    • SSDEEP

      49152:/VAbwqtogFa7ghSPjUrNIPq6rlSfccB8n5OeqX3rYMPff:9ANtogF/hdGJxE7eqX0e

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks