General

  • Target

    223b89702701ba9d808ca0a6be84bface4b45670fd40615cf8fec911b2b240b7

  • Size

    2.7MB

  • Sample

    241109-af9bkasgqe

  • MD5

    4319a4f5332aa9626bcd24026166bb83

  • SHA1

    6cd1cfee31bf69ce902453fcd3f840979c33aeaf

  • SHA256

    223b89702701ba9d808ca0a6be84bface4b45670fd40615cf8fec911b2b240b7

  • SHA512

    0971454813ace9114c5043a8db092f0d14e794221584a545bad15ef51e2808885d4e4c0fc6ca404ba9401a99072858d8753e070cf02cc4ed5209554163de0a36

  • SSDEEP

    49152:jUrzQJvCTdM5nn6BPURopklHNPaOZnpU/ZypaoHvdbia:Ar0JaTdMhWPdpCIOZn

Malware Config

Targets

    • Target

      223b89702701ba9d808ca0a6be84bface4b45670fd40615cf8fec911b2b240b7

    • Size

      2.7MB

    • MD5

      4319a4f5332aa9626bcd24026166bb83

    • SHA1

      6cd1cfee31bf69ce902453fcd3f840979c33aeaf

    • SHA256

      223b89702701ba9d808ca0a6be84bface4b45670fd40615cf8fec911b2b240b7

    • SHA512

      0971454813ace9114c5043a8db092f0d14e794221584a545bad15ef51e2808885d4e4c0fc6ca404ba9401a99072858d8753e070cf02cc4ed5209554163de0a36

    • SSDEEP

      49152:jUrzQJvCTdM5nn6BPURopklHNPaOZnpU/ZypaoHvdbia:Ar0JaTdMhWPdpCIOZn

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks