General

  • Target

    b46ec46d7346670ece5540ed1018bf6eca177c7938427973fa4906520894d292

  • Size

    66KB

  • Sample

    241108-n5nm2ssald

  • MD5

    99d364bbb0cd639b245df52c6ac221bc

  • SHA1

    ebd6dfb2337ea37d95dafefa2a79ed76f32b62d3

  • SHA256

    b46ec46d7346670ece5540ed1018bf6eca177c7938427973fa4906520894d292

  • SHA512

    28e962493135d92ff7bb34c9d18f9322b76a290b80936d90b091e007a8c0069215feb5cf6ae00106112df781c212d922e7380f6dbc1adc8a0eea0339f53e7141

  • SSDEEP

    1536:Iwuse+Zk77RNzLiTO6b4yzwC132n6sLDDO:Iwuse+aX3zv6b4yzjsLXO

Malware Config

Targets

    • Target

      b46ec46d7346670ece5540ed1018bf6eca177c7938427973fa4906520894d292

    • Size

      66KB

    • MD5

      99d364bbb0cd639b245df52c6ac221bc

    • SHA1

      ebd6dfb2337ea37d95dafefa2a79ed76f32b62d3

    • SHA256

      b46ec46d7346670ece5540ed1018bf6eca177c7938427973fa4906520894d292

    • SHA512

      28e962493135d92ff7bb34c9d18f9322b76a290b80936d90b091e007a8c0069215feb5cf6ae00106112df781c212d922e7380f6dbc1adc8a0eea0339f53e7141

    • SSDEEP

      1536:Iwuse+Zk77RNzLiTO6b4yzwC132n6sLDDO:Iwuse+aX3zv6b4yzjsLXO

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks