General

  • Target

    9d39b23c6469b33daf444bbe415f9cc054c9cf2b3bb3a54c67ad0dc3edf17afa

  • Size

    1.1MB

  • Sample

    241109-y2dzjstqcl

  • MD5

    ecf947b805ec2fa913043a6f860d0d5d

  • SHA1

    64ad7cc94852adb8357686bfd1072f2acd9b829c

  • SHA256

    9d39b23c6469b33daf444bbe415f9cc054c9cf2b3bb3a54c67ad0dc3edf17afa

  • SHA512

    2a4ff7b3aad427047c5fce2746b8f8fe299948b95c1562cb1cb5a6d51a0b56dab1793481d877e92157128c9a1603c4a9ff6bee979db008c153d65f247d8ed6e1

  • SSDEEP

    24576:M3N24f9AiKGpEoQpkN2C4McuKo0GTNJpyT5RGeQa0s:MdF+GtCi27mVHyT+a0s

Malware Config

Targets

    • Target

      9d39b23c6469b33daf444bbe415f9cc054c9cf2b3bb3a54c67ad0dc3edf17afa

    • Size

      1.1MB

    • MD5

      ecf947b805ec2fa913043a6f860d0d5d

    • SHA1

      64ad7cc94852adb8357686bfd1072f2acd9b829c

    • SHA256

      9d39b23c6469b33daf444bbe415f9cc054c9cf2b3bb3a54c67ad0dc3edf17afa

    • SHA512

      2a4ff7b3aad427047c5fce2746b8f8fe299948b95c1562cb1cb5a6d51a0b56dab1793481d877e92157128c9a1603c4a9ff6bee979db008c153d65f247d8ed6e1

    • SSDEEP

      24576:M3N24f9AiKGpEoQpkN2C4McuKo0GTNJpyT5RGeQa0s:MdF+GtCi27mVHyT+a0s

    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks