General

  • Target

    0f9814dbcb763e60e8389e111ebd37d96fdb4cb982d9240811ee4d1c1b84271e

  • Size

    369KB

  • Sample

    241108-n9xrhssbje

  • MD5

    6b31b14ef2b092194c88b2f01aac6c75

  • SHA1

    44998d5eaea5a8d1c2e8d416aab96bc5fd98220b

  • SHA256

    0f9814dbcb763e60e8389e111ebd37d96fdb4cb982d9240811ee4d1c1b84271e

  • SHA512

    e6b4831aa17b1f6c9692e750e4967a3fcc25fbd1126cccde7404e5dab942c748f61e71c4e1b56fe71a6e6614d100856099be9d2cedcfade2ede5b6b35f2532cc

  • SSDEEP

    6144:aF46tGfC0jKzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:aF3WFjyU66b5zhVymA/XSRh

Malware Config

Targets

    • Target

      0f9814dbcb763e60e8389e111ebd37d96fdb4cb982d9240811ee4d1c1b84271e

    • Size

      369KB

    • MD5

      6b31b14ef2b092194c88b2f01aac6c75

    • SHA1

      44998d5eaea5a8d1c2e8d416aab96bc5fd98220b

    • SHA256

      0f9814dbcb763e60e8389e111ebd37d96fdb4cb982d9240811ee4d1c1b84271e

    • SHA512

      e6b4831aa17b1f6c9692e750e4967a3fcc25fbd1126cccde7404e5dab942c748f61e71c4e1b56fe71a6e6614d100856099be9d2cedcfade2ede5b6b35f2532cc

    • SSDEEP

      6144:aF46tGfC0jKzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:aF3WFjyU66b5zhVymA/XSRh

    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks