General

  • Target

    689c633cc1679b8897e1465758514a1cd4c7403030ed24b9994b4d20238345fe

  • Size

    667KB

  • Sample

    241108-n9x3aa1mew

  • MD5

    7105f41d7dd589666d9e3dec491ad9f6

  • SHA1

    d37484556574b62fe5b5f1897a078dc84f807520

  • SHA256

    689c633cc1679b8897e1465758514a1cd4c7403030ed24b9994b4d20238345fe

  • SHA512

    82a3e0282761ced94d4d22528541c225628c8b5759c082b81c1d73059b736c1dc6fac00394128c160dbe58e4ddd8135c611775fe3dfcb10a8f17a5c1e21614d8

  • SSDEEP

    6144:aF46tGfC0j8C9LRU0ySj14WH+JPb7uL8zRMnJjNhAp7SO8zRMnJjNhAp7S8FRcd+:aF3WFjdPFlTz

Malware Config

Targets

    • Target

      689c633cc1679b8897e1465758514a1cd4c7403030ed24b9994b4d20238345fe

    • Size

      667KB

    • MD5

      7105f41d7dd589666d9e3dec491ad9f6

    • SHA1

      d37484556574b62fe5b5f1897a078dc84f807520

    • SHA256

      689c633cc1679b8897e1465758514a1cd4c7403030ed24b9994b4d20238345fe

    • SHA512

      82a3e0282761ced94d4d22528541c225628c8b5759c082b81c1d73059b736c1dc6fac00394128c160dbe58e4ddd8135c611775fe3dfcb10a8f17a5c1e21614d8

    • SSDEEP

      6144:aF46tGfC0j8C9LRU0ySj14WH+JPb7uL8zRMnJjNhAp7SO8zRMnJjNhAp7S8FRcd+:aF3WFjdPFlTz

    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks