General

  • Target

    c0fe53af9d938a5ad4e4f948598380be14c0007103f134eb3e93018948e1119f

  • Size

    92KB

  • Sample

    241026-fy3vdszgpc

  • MD5

    27b757c27510f330e16fd089b63b5d30

  • SHA1

    d7209ea2bab017823c984ce4842cdf3caaa70f5f

  • SHA256

    c0fe53af9d938a5ad4e4f948598380be14c0007103f134eb3e93018948e1119f

  • SHA512

    58492dec9c6e8a0adabe74f5bae3c5a7638daf91a6f222f640e1d452c551ebc825c797ca56dd6c8fd434a08a659b620e89e8bb8c347c5f877fb9cde337117e9f

  • SSDEEP

    1536:I4we+Zk77RNzLiTO7yapmebn4ddJZeY86iLflLJYEIs67rxo:I4we+aX3zv2LK4ddJMY86ipmns6S

Malware Config

Targets

    • Target

      c0fe53af9d938a5ad4e4f948598380be14c0007103f134eb3e93018948e1119f

    • Size

      92KB

    • MD5

      27b757c27510f330e16fd089b63b5d30

    • SHA1

      d7209ea2bab017823c984ce4842cdf3caaa70f5f

    • SHA256

      c0fe53af9d938a5ad4e4f948598380be14c0007103f134eb3e93018948e1119f

    • SHA512

      58492dec9c6e8a0adabe74f5bae3c5a7638daf91a6f222f640e1d452c551ebc825c797ca56dd6c8fd434a08a659b620e89e8bb8c347c5f877fb9cde337117e9f

    • SSDEEP

      1536:I4we+Zk77RNzLiTO7yapmebn4ddJZeY86iLflLJYEIs67rxo:I4we+aX3zv2LK4ddJMY86ipmns6S

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks