General

  • Target

    151cb45dfbe9ab61f2554b913b6755429d967baeb084b6dc036cc6a14af5b95a

  • Size

    3.1MB

  • Sample

    241031-kcyqrssrct

  • MD5

    c81e881ec3e235fb059594ddc978350d

  • SHA1

    1cbbe3302ea8fb9caab32c30f4412e8a500b1621

  • SHA256

    151cb45dfbe9ab61f2554b913b6755429d967baeb084b6dc036cc6a14af5b95a

  • SHA512

    f43a53491787ace129dbe0040f8958d088dbb6f70983521651317741edf8d9395c1410757ff4055c2a295592c180f5393260f94b1ac2eaad431bcaf6c4845103

  • SSDEEP

    98304:NAyXe7ykegiTNpjQpSI14jSKQoDXAy0YbJ31nu2Cmh:rXe7tiTHjY4jS1sXA/mJ5u2nh

Malware Config

Targets

    • Target

      151cb45dfbe9ab61f2554b913b6755429d967baeb084b6dc036cc6a14af5b95a

    • Size

      3.1MB

    • MD5

      c81e881ec3e235fb059594ddc978350d

    • SHA1

      1cbbe3302ea8fb9caab32c30f4412e8a500b1621

    • SHA256

      151cb45dfbe9ab61f2554b913b6755429d967baeb084b6dc036cc6a14af5b95a

    • SHA512

      f43a53491787ace129dbe0040f8958d088dbb6f70983521651317741edf8d9395c1410757ff4055c2a295592c180f5393260f94b1ac2eaad431bcaf6c4845103

    • SSDEEP

      98304:NAyXe7ykegiTNpjQpSI14jSKQoDXAy0YbJ31nu2Cmh:rXe7tiTHjY4jS1sXA/mJ5u2nh

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks