General

  • Target

    8a5398933ab1a292ba559104593d20406b9f8a60670249aa0809cc355f219f3a

  • Size

    669KB

  • Sample

    241101-qzvkhs1drf

  • MD5

    99defaec3c724136d844bd44afadd35f

  • SHA1

    a7ae986cee8ab1b69e991c259784e9adcea2e084

  • SHA256

    8a5398933ab1a292ba559104593d20406b9f8a60670249aa0809cc355f219f3a

  • SHA512

    e5af5ee2c7a7f66ba9afb2de87aa2622840edf42971f81e08ae03edd30339a23c7985523d9b80cad2a2fd89903e2fb1e8ae5ddd5d0fb2a13f1beeac95d73b306

  • SSDEEP

    12288:cSfSps28tL4l4Xzqs4f2S3heRW2ULNLw6VNCsJlgDaKJl:f0O0WX1rSxIW2oNxmYlgDaKr

Malware Config

Targets

    • Target

      8a5398933ab1a292ba559104593d20406b9f8a60670249aa0809cc355f219f3a

    • Size

      669KB

    • MD5

      99defaec3c724136d844bd44afadd35f

    • SHA1

      a7ae986cee8ab1b69e991c259784e9adcea2e084

    • SHA256

      8a5398933ab1a292ba559104593d20406b9f8a60670249aa0809cc355f219f3a

    • SHA512

      e5af5ee2c7a7f66ba9afb2de87aa2622840edf42971f81e08ae03edd30339a23c7985523d9b80cad2a2fd89903e2fb1e8ae5ddd5d0fb2a13f1beeac95d73b306

    • SSDEEP

      12288:cSfSps28tL4l4Xzqs4f2S3heRW2ULNLw6VNCsJlgDaKJl:f0O0WX1rSxIW2oNxmYlgDaKr

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks