General

  • Target

    c1ae61c35f0286c94dd114441b63eb82fdfd7d322ef46aab92eb73902b17c283

  • Size

    577KB

  • Sample

    241109-y3x4ta1fpl

  • MD5

    3c8d51cfb63666d0a80fb0722b89754a

  • SHA1

    588f67f35d30a79e7b809302882a32ab4cf6a943

  • SHA256

    c1ae61c35f0286c94dd114441b63eb82fdfd7d322ef46aab92eb73902b17c283

  • SHA512

    3c9a60d536c4a9e6b1db3f01167bfdca11d2a5238c1e177578acf4b5b07bb92ad0a15ece46bc7040dbe2a34709777b5a8e4e74fefa24739a8e1df4e243b08f8e

  • SSDEEP

    6144:M46tGdyr6VE7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4tR:M3N2m7a3iwbihym2g7XO3LWUQfh4Co

Malware Config

Targets

    • Target

      c1ae61c35f0286c94dd114441b63eb82fdfd7d322ef46aab92eb73902b17c283

    • Size

      577KB

    • MD5

      3c8d51cfb63666d0a80fb0722b89754a

    • SHA1

      588f67f35d30a79e7b809302882a32ab4cf6a943

    • SHA256

      c1ae61c35f0286c94dd114441b63eb82fdfd7d322ef46aab92eb73902b17c283

    • SHA512

      3c9a60d536c4a9e6b1db3f01167bfdca11d2a5238c1e177578acf4b5b07bb92ad0a15ece46bc7040dbe2a34709777b5a8e4e74fefa24739a8e1df4e243b08f8e

    • SSDEEP

      6144:M46tGdyr6VE7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4tR:M3N2m7a3iwbihym2g7XO3LWUQfh4Co

    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks