General

  • Target

    3e54cac3e2dae3c86908ddc0674b051bf90c1928.dll

  • Size

    6.4MB

  • Sample

    241108-r1ar6stgqk

  • MD5

    ce0dee6210659c6396ab4c1fa578cf5e

  • SHA1

    3e54cac3e2dae3c86908ddc0674b051bf90c1928

  • SHA256

    ef1994abb84e0746c9451910c7c81cc2f2f8e7b10a1459f7f022bb4b25ed4248

  • SHA512

    a7ead70f9f4783c017292ea6f7f2973b1b21b640135a9654f7bd6fc5b909f6d03373b80e61aee486b55312e81a3acec934768dcab737e6c088606fa6fce8ed73

  • SSDEEP

    196608:LY4/1mssttTWe3aWdYr1h8pkCfYHjP2z4:DMZXaWda1SplfqrB

Malware Config

Targets

    • Target

      3e54cac3e2dae3c86908ddc0674b051bf90c1928.dll

    • Size

      6.4MB

    • MD5

      ce0dee6210659c6396ab4c1fa578cf5e

    • SHA1

      3e54cac3e2dae3c86908ddc0674b051bf90c1928

    • SHA256

      ef1994abb84e0746c9451910c7c81cc2f2f8e7b10a1459f7f022bb4b25ed4248

    • SHA512

      a7ead70f9f4783c017292ea6f7f2973b1b21b640135a9654f7bd6fc5b909f6d03373b80e61aee486b55312e81a3acec934768dcab737e6c088606fa6fce8ed73

    • SSDEEP

      196608:LY4/1mssttTWe3aWdYr1h8pkCfYHjP2z4:DMZXaWda1SplfqrB

    • Blocklisted process makes network request

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks