General

  • Target

    137f28a011fe3d081848fec7568b4db63e37d9919ee4de39522533d2f48ff85c

  • Size

    3.1MB

  • Sample

    241031-j6byesvdqm

  • MD5

    944bd6719f9a3b5fefe7f2eb96b0aa1b

  • SHA1

    2b4d4afbe6938e721ae52cb91a859587955a29b1

  • SHA256

    137f28a011fe3d081848fec7568b4db63e37d9919ee4de39522533d2f48ff85c

  • SHA512

    c0592ed39a0107965236fb59aa1a2f3ec9d48585ee8777c238c2c014c41596c3c1049b908f733b7b9c53b9b3ffed28b4cb409a17943d4921d75f6b6d8d7ac230

  • SSDEEP

    98304:lAyXe7ykegiTNpjQpSI14jSKQoDXAy0YbJ31nu2Cmh:jXe7tiTHjY4jS1sXA/mJ5u2nh

Malware Config

Targets

    • Target

      137f28a011fe3d081848fec7568b4db63e37d9919ee4de39522533d2f48ff85c

    • Size

      3.1MB

    • MD5

      944bd6719f9a3b5fefe7f2eb96b0aa1b

    • SHA1

      2b4d4afbe6938e721ae52cb91a859587955a29b1

    • SHA256

      137f28a011fe3d081848fec7568b4db63e37d9919ee4de39522533d2f48ff85c

    • SHA512

      c0592ed39a0107965236fb59aa1a2f3ec9d48585ee8777c238c2c014c41596c3c1049b908f733b7b9c53b9b3ffed28b4cb409a17943d4921d75f6b6d8d7ac230

    • SSDEEP

      98304:lAyXe7ykegiTNpjQpSI14jSKQoDXAy0YbJ31nu2Cmh:jXe7tiTHjY4jS1sXA/mJ5u2nh

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks