General

  • Target

    2e70446c01c82a985c55609a13026ce8347ec2df158f3423039ab4984e8e6f8e

  • Size

    577KB

  • Sample

    241108-n9x3aasbjf

  • MD5

    9351c2344c2e29b2e4607160a69f6033

  • SHA1

    486eb128d613856bffe8d3a93578095ad520acaa

  • SHA256

    2e70446c01c82a985c55609a13026ce8347ec2df158f3423039ab4984e8e6f8e

  • SHA512

    c311c5938b986fb4a4bdc53064c7e3cfc4a252551ed5720cad8870f354a574137ffd3c623721722c182b21577c12a01fb0b6c8ab03e2425664e9588b408dc4b5

  • SSDEEP

    12288:aF3WFjn7a3iwbihym2g7XO3LWUQfh4Co:63Mq+gkE2fh4Co

Malware Config

Targets

    • Target

      2e70446c01c82a985c55609a13026ce8347ec2df158f3423039ab4984e8e6f8e

    • Size

      577KB

    • MD5

      9351c2344c2e29b2e4607160a69f6033

    • SHA1

      486eb128d613856bffe8d3a93578095ad520acaa

    • SHA256

      2e70446c01c82a985c55609a13026ce8347ec2df158f3423039ab4984e8e6f8e

    • SHA512

      c311c5938b986fb4a4bdc53064c7e3cfc4a252551ed5720cad8870f354a574137ffd3c623721722c182b21577c12a01fb0b6c8ab03e2425664e9588b408dc4b5

    • SSDEEP

      12288:aF3WFjn7a3iwbihym2g7XO3LWUQfh4Co:63Mq+gkE2fh4Co

    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks