General

  • Target

    f42573518414f3ee5db600854cc4280a7d2b30a7c156046f88ebfdf157d165fc

  • Size

    231KB

  • Sample

    241026-fp9lksxrdy

  • MD5

    965fd7a70f50041157ef33b84adccccd

  • SHA1

    e991e0e74e2515116ecc627e550c9f9a83408071

  • SHA256

    f42573518414f3ee5db600854cc4280a7d2b30a7c156046f88ebfdf157d165fc

  • SHA512

    162318aaf3e5d49f7e88cef2fa1a61311d69cd1eb1aeb479486d51a29702334be36541edecdefd95b3f048f1f3aad6b0fdf5669aebdfad2ae2fbaaa9fe8203c8

  • SSDEEP

    6144:6Piynu0cvT2wQc4+T6YWtQSh/iuGkq7L2/zlUMh:6Piynu0cK9g6YWtp7TWSOI

Malware Config

Targets

    • Target

      f42573518414f3ee5db600854cc4280a7d2b30a7c156046f88ebfdf157d165fc

    • Size

      231KB

    • MD5

      965fd7a70f50041157ef33b84adccccd

    • SHA1

      e991e0e74e2515116ecc627e550c9f9a83408071

    • SHA256

      f42573518414f3ee5db600854cc4280a7d2b30a7c156046f88ebfdf157d165fc

    • SHA512

      162318aaf3e5d49f7e88cef2fa1a61311d69cd1eb1aeb479486d51a29702334be36541edecdefd95b3f048f1f3aad6b0fdf5669aebdfad2ae2fbaaa9fe8203c8

    • SSDEEP

      6144:6Piynu0cvT2wQc4+T6YWtQSh/iuGkq7L2/zlUMh:6Piynu0cK9g6YWtp7TWSOI

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks