General

  • Target

    eab85511d466d036e02ae3cb73b4ac05de9164f4cdc7ac7d3eff2b24ef4698ed

  • Size

    93KB

  • Sample

    241109-y2dc1s1fln

  • MD5

    abc245213c30f659f6ecd240dee7fd87

  • SHA1

    e991167d7e50c269cb1fd5f055592486ab2752d2

  • SHA256

    eab85511d466d036e02ae3cb73b4ac05de9164f4cdc7ac7d3eff2b24ef4698ed

  • SHA512

    fde8370c513518fbe395dcea4a5b1549416894365cd9307b7a14d63ddeac23b0f4053baf6359c72266add3cb1c80a200f2d03b355503a1e72c3bf371814f7162

  • SSDEEP

    1536:HcaYzMXqtGNttyitOpg22Tyapmebn4ddJZeY86iLflLJYEIs67rxo:HcaY46tGNttyCa6eLK4ddJMY86ipmnsx

Malware Config

Targets

    • Target

      eab85511d466d036e02ae3cb73b4ac05de9164f4cdc7ac7d3eff2b24ef4698ed

    • Size

      93KB

    • MD5

      abc245213c30f659f6ecd240dee7fd87

    • SHA1

      e991167d7e50c269cb1fd5f055592486ab2752d2

    • SHA256

      eab85511d466d036e02ae3cb73b4ac05de9164f4cdc7ac7d3eff2b24ef4698ed

    • SHA512

      fde8370c513518fbe395dcea4a5b1549416894365cd9307b7a14d63ddeac23b0f4053baf6359c72266add3cb1c80a200f2d03b355503a1e72c3bf371814f7162

    • SSDEEP

      1536:HcaYzMXqtGNttyitOpg22Tyapmebn4ddJZeY86iLflLJYEIs67rxo:HcaY46tGNttyCa6eLK4ddJMY86ipmnsx

    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks