General

  • Target

    0bcee12c3e7536f09aef3f67849a20d33979d24578736b51e90435dcfc159836

  • Size

    194KB

  • Sample

    241031-zvmhsa1rgv

  • MD5

    20582f9888989940e2fc761d0c264ead

  • SHA1

    5bf565255ad4d300a42f9cbac45e74a82dd19f10

  • SHA256

    0bcee12c3e7536f09aef3f67849a20d33979d24578736b51e90435dcfc159836

  • SHA512

    d29d3ff8e663b058e5a1a63c2ff53c193570e12961b360b63f85d8ae344904131a2875e5a1d0d0089a70ac1fde860abeb6b717d99f23abe383ef811ca8b7c04e

  • SSDEEP

    3072:QoiD6UJRpHOrBbsfxm/MxlQq1IcB9nXg88LIHfj68agvkvhBkPhIe/yL6un:EDJTOrBQgMNIcBBQ1I/jogvEZd

Malware Config

Targets

    • Target

      0bcee12c3e7536f09aef3f67849a20d33979d24578736b51e90435dcfc159836

    • Size

      194KB

    • MD5

      20582f9888989940e2fc761d0c264ead

    • SHA1

      5bf565255ad4d300a42f9cbac45e74a82dd19f10

    • SHA256

      0bcee12c3e7536f09aef3f67849a20d33979d24578736b51e90435dcfc159836

    • SHA512

      d29d3ff8e663b058e5a1a63c2ff53c193570e12961b360b63f85d8ae344904131a2875e5a1d0d0089a70ac1fde860abeb6b717d99f23abe383ef811ca8b7c04e

    • SSDEEP

      3072:QoiD6UJRpHOrBbsfxm/MxlQq1IcB9nXg88LIHfj68agvkvhBkPhIe/yL6un:EDJTOrBQgMNIcBBQ1I/jogvEZd

    • Blocklisted process makes network request

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks