General

  • Target

    b3323c69e353f4e3cb78802f86595fa32acceefbd5aa3cd3749bfd0ef644fb52

  • Size

    56KB

  • Sample

    241026-fyv5js1gmm

  • MD5

    e2137d78faa8d0b1b9eee4842fb632eb

  • SHA1

    cc8b7583c7e40f0d4b8560b27c1bd04210f50cf9

  • SHA256

    b3323c69e353f4e3cb78802f86595fa32acceefbd5aa3cd3749bfd0ef644fb52

  • SHA512

    bfa34a3658eae03eca66f192072ed529df0f23900a3c6e4173cc2c90938b035c43c34bb6689b3b2c25ea7ec807728e4e5ded16cbc949b3beba091800b80908f0

  • SSDEEP

    768:I4JYRO5RroZJ767395uINnEfDKBbUCp1OTZ+/VPqgt6jpYU5ltbDrYiI0oPxWExI:I4we+Zk77RNzLiTOx6jWWvr78Pxc

Malware Config

Targets

    • Target

      b3323c69e353f4e3cb78802f86595fa32acceefbd5aa3cd3749bfd0ef644fb52

    • Size

      56KB

    • MD5

      e2137d78faa8d0b1b9eee4842fb632eb

    • SHA1

      cc8b7583c7e40f0d4b8560b27c1bd04210f50cf9

    • SHA256

      b3323c69e353f4e3cb78802f86595fa32acceefbd5aa3cd3749bfd0ef644fb52

    • SHA512

      bfa34a3658eae03eca66f192072ed529df0f23900a3c6e4173cc2c90938b035c43c34bb6689b3b2c25ea7ec807728e4e5ded16cbc949b3beba091800b80908f0

    • SSDEEP

      768:I4JYRO5RroZJ767395uINnEfDKBbUCp1OTZ+/VPqgt6jpYU5ltbDrYiI0oPxWExI:I4we+Zk77RNzLiTOx6jWWvr78Pxc

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks