General

  • Target

    6ef5dead93bbd8b08efc827105b5c71fdd9d773b71f7ca665d89b5514ea39c57

  • Size

    3.1MB

  • Sample

    241031-j8qjlavcjb

  • MD5

    918d2f7e8aec9964ce5ebf4ccda5e586

  • SHA1

    35879e84f4f8527bfafecbaa8acfab9c62734730

  • SHA256

    6ef5dead93bbd8b08efc827105b5c71fdd9d773b71f7ca665d89b5514ea39c57

  • SHA512

    ed486b1b9ba7d4b1c89fd7966c3c1cff7209161a6608f9817fb1079e1cb97fabd299f5f80473cde0274372bb772a699b20b348b7862bac434331a57c1f04aa24

  • SSDEEP

    98304:XAyXe7ykegiTNpjQpSI14jSKQoDXAy0YbJ31nu2Cmh:ZXe7tiTHjY4jS1sXA/mJ5u2nh

Malware Config

Targets

    • Target

      6ef5dead93bbd8b08efc827105b5c71fdd9d773b71f7ca665d89b5514ea39c57

    • Size

      3.1MB

    • MD5

      918d2f7e8aec9964ce5ebf4ccda5e586

    • SHA1

      35879e84f4f8527bfafecbaa8acfab9c62734730

    • SHA256

      6ef5dead93bbd8b08efc827105b5c71fdd9d773b71f7ca665d89b5514ea39c57

    • SHA512

      ed486b1b9ba7d4b1c89fd7966c3c1cff7209161a6608f9817fb1079e1cb97fabd299f5f80473cde0274372bb772a699b20b348b7862bac434331a57c1f04aa24

    • SSDEEP

      98304:XAyXe7ykegiTNpjQpSI14jSKQoDXAy0YbJ31nu2Cmh:ZXe7tiTHjY4jS1sXA/mJ5u2nh

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks