General

  • Target

    452c390b5df55e9c8954ca0e8e2e99fb589b9c918b4bfac9b37bdf2d6bd146f4

  • Size

    186KB

  • Sample

    241108-n6dt8ssbjr

  • MD5

    367b1901b571b53921ac6c603694e0b7

  • SHA1

    31b89b82447e33fca38d4df17416b212dd691bd2

  • SHA256

    452c390b5df55e9c8954ca0e8e2e99fb589b9c918b4bfac9b37bdf2d6bd146f4

  • SHA512

    a95e7d5f1b97dfe36cc9cd8f2a8bc30a71da92777c7d56f036c2c0a62b8dc23b5f68ad0672ba41a8d41620cb14d8c01a232df3b3ea4749dd7d9e07c9da55a180

  • SSDEEP

    3072:PguM/aY46tGNttyJQ7KRXARYLJXJoYtpA/H3RpDecC+EZX70RjLTu46R0Eb:3MR46tGdyJgYLjvqXRpDecw7Kj3u46db

Malware Config

Targets

    • Target

      452c390b5df55e9c8954ca0e8e2e99fb589b9c918b4bfac9b37bdf2d6bd146f4

    • Size

      186KB

    • MD5

      367b1901b571b53921ac6c603694e0b7

    • SHA1

      31b89b82447e33fca38d4df17416b212dd691bd2

    • SHA256

      452c390b5df55e9c8954ca0e8e2e99fb589b9c918b4bfac9b37bdf2d6bd146f4

    • SHA512

      a95e7d5f1b97dfe36cc9cd8f2a8bc30a71da92777c7d56f036c2c0a62b8dc23b5f68ad0672ba41a8d41620cb14d8c01a232df3b3ea4749dd7d9e07c9da55a180

    • SSDEEP

      3072:PguM/aY46tGNttyJQ7KRXARYLJXJoYtpA/H3RpDecC+EZX70RjLTu46R0Eb:3MR46tGdyJgYLjvqXRpDecw7Kj3u46db

    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks