General

  • Target

    1f2d735f88cfdcb55674cb132bff011bb023572c763498d5a562493b68fc7edf

  • Size

    203KB

  • Sample

    241110-b56gmsxarb

  • MD5

    edb5b7ac0669664ff60e967121511349

  • SHA1

    70dfa4cf03ad16c43d3a84aceb397636558bcd0e

  • SHA256

    1f2d735f88cfdcb55674cb132bff011bb023572c763498d5a562493b68fc7edf

  • SHA512

    9a5b52817485c26854d1af75ae14e97d3a1e2a5b5b248ba2f8e11dea9cce52c81d0fd3ae62c39e6dc95aa17aaac44c1cf3ed52a6f1cfb132302bc909322c6321

  • SSDEEP

    3072:fP5gvNVLIfHQja1RfmLQADwSKkhU+tLgT5lODbiC8r1PkT:X2vnSwjaOcADw9cUeCOf

Malware Config

Targets

    • Target

      1f2d735f88cfdcb55674cb132bff011bb023572c763498d5a562493b68fc7edf

    • Size

      203KB

    • MD5

      edb5b7ac0669664ff60e967121511349

    • SHA1

      70dfa4cf03ad16c43d3a84aceb397636558bcd0e

    • SHA256

      1f2d735f88cfdcb55674cb132bff011bb023572c763498d5a562493b68fc7edf

    • SHA512

      9a5b52817485c26854d1af75ae14e97d3a1e2a5b5b248ba2f8e11dea9cce52c81d0fd3ae62c39e6dc95aa17aaac44c1cf3ed52a6f1cfb132302bc909322c6321

    • SSDEEP

      3072:fP5gvNVLIfHQja1RfmLQADwSKkhU+tLgT5lODbiC8r1PkT:X2vnSwjaOcADw9cUeCOf

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks