General

  • Target

    0766ce91b0ee09ea3190fae0debd079c7a5c2d5b3c8ab1704a45001fcef63c52

  • Size

    368KB

  • Sample

    241026-fyrr5a1gml

  • MD5

    272a3bbacce818b3c5cb9e0e73639f1d

  • SHA1

    059e77c4a88af2188aba9e8db8ff64c73d89e4a4

  • SHA256

    0766ce91b0ee09ea3190fae0debd079c7a5c2d5b3c8ab1704a45001fcef63c52

  • SHA512

    98d9555f829cba2c0d2a4277da5ffcedd9236644cdc3f544ab77d56c16320d5f99484c7dc634f2b1aad850c4db429e84f4da5892930ca792c4db938705d2d9fc

  • SSDEEP

    6144:fl+aX3LDzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:fl+ajU66b5zhVymA/XSRh

Malware Config

Targets

    • Target

      0766ce91b0ee09ea3190fae0debd079c7a5c2d5b3c8ab1704a45001fcef63c52

    • Size

      368KB

    • MD5

      272a3bbacce818b3c5cb9e0e73639f1d

    • SHA1

      059e77c4a88af2188aba9e8db8ff64c73d89e4a4

    • SHA256

      0766ce91b0ee09ea3190fae0debd079c7a5c2d5b3c8ab1704a45001fcef63c52

    • SHA512

      98d9555f829cba2c0d2a4277da5ffcedd9236644cdc3f544ab77d56c16320d5f99484c7dc634f2b1aad850c4db429e84f4da5892930ca792c4db938705d2d9fc

    • SSDEEP

      6144:fl+aX3LDzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:fl+ajU66b5zhVymA/XSRh

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks