General

  • Target

    b0bee0b7eb576f488eba7f23a2d6341911293b06626a82b24bf727119bb1f65f

  • Size

    11.1MB

  • Sample

    241108-n9z7mssbkb

  • MD5

    f906959092bda97cfedfd0a1a8df9cbf

  • SHA1

    efcd1ab0ef58fca5528906d7246f7205d6c3e525

  • SHA256

    b0bee0b7eb576f488eba7f23a2d6341911293b06626a82b24bf727119bb1f65f

  • SHA512

    69e1c6ff3939d357b27406dea7ba5ae1b81a53a1fbe55567c2ecb74544677c663f122ee16e00cb0b755598176cf38cd9a33d63b3be78ad3218aa7cf25ad67d39

  • SSDEEP

    98304:6Eb+0ChEPIGiq3y3vx+w9TbfjJ+kdfpK46Tle36jknz9Y:6O+kIGv3y/x+KTbfjJ+kdnAlejY

Malware Config

Targets

    • Target

      b0bee0b7eb576f488eba7f23a2d6341911293b06626a82b24bf727119bb1f65f

    • Size

      11.1MB

    • MD5

      f906959092bda97cfedfd0a1a8df9cbf

    • SHA1

      efcd1ab0ef58fca5528906d7246f7205d6c3e525

    • SHA256

      b0bee0b7eb576f488eba7f23a2d6341911293b06626a82b24bf727119bb1f65f

    • SHA512

      69e1c6ff3939d357b27406dea7ba5ae1b81a53a1fbe55567c2ecb74544677c663f122ee16e00cb0b755598176cf38cd9a33d63b3be78ad3218aa7cf25ad67d39

    • SSDEEP

      98304:6Eb+0ChEPIGiq3y3vx+w9TbfjJ+kdfpK46Tle36jknz9Y:6O+kIGv3y/x+KTbfjJ+kdnAlejY

    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks