General

  • Target

    3d4a70335fb004a6ea3d5fae554d58886103b5259174c584fa044881feb3b4fc

  • Size

    394KB

  • Sample

    241108-n7kn6ssbln

  • MD5

    eb751f101f44e1b0a5f708bb2a7136a3

  • SHA1

    30a24f720abc289907d6bd556d3b7360567d7200

  • SHA256

    3d4a70335fb004a6ea3d5fae554d58886103b5259174c584fa044881feb3b4fc

  • SHA512

    80728045e7af99cb81a91e75b6cbc0cc12151076af7dc225bf307e05df9e96a76498f0e50dd4fe850e8570e4e1f393c943d4c932a0589e0425d081b26ec92c00

  • SSDEEP

    6144:3MR46tGdyLP2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGuYK:c3NcahVy41

Malware Config

Targets

    • Target

      3d4a70335fb004a6ea3d5fae554d58886103b5259174c584fa044881feb3b4fc

    • Size

      394KB

    • MD5

      eb751f101f44e1b0a5f708bb2a7136a3

    • SHA1

      30a24f720abc289907d6bd556d3b7360567d7200

    • SHA256

      3d4a70335fb004a6ea3d5fae554d58886103b5259174c584fa044881feb3b4fc

    • SHA512

      80728045e7af99cb81a91e75b6cbc0cc12151076af7dc225bf307e05df9e96a76498f0e50dd4fe850e8570e4e1f393c943d4c932a0589e0425d081b26ec92c00

    • SSDEEP

      6144:3MR46tGdyLP2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGuYK:c3NcahVy41

    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks