General

  • Target

    2d8efca61cd4ab435ac87cbba69f0eaf5c3e85d1f299f0f6d95732dd555320ff

  • Size

    410KB

  • Sample

    241110-f3x5pszhmr

  • MD5

    c3e489876127d19d61b639c73522f12b

  • SHA1

    0684f248679817f8e11bd25b564d640b68a2ad86

  • SHA256

    2d8efca61cd4ab435ac87cbba69f0eaf5c3e85d1f299f0f6d95732dd555320ff

  • SHA512

    0661de909c6cced8830d6740b4c3c6665634bbac34c713a667c17ad8b773995fd7f795a41152ea437e26d045196354d91c39715152fa74b4bb104d27c7a361e4

  • SSDEEP

    6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse

Malware Config

Targets

    • Target

      2d8efca61cd4ab435ac87cbba69f0eaf5c3e85d1f299f0f6d95732dd555320ff

    • Size

      410KB

    • MD5

      c3e489876127d19d61b639c73522f12b

    • SHA1

      0684f248679817f8e11bd25b564d640b68a2ad86

    • SHA256

      2d8efca61cd4ab435ac87cbba69f0eaf5c3e85d1f299f0f6d95732dd555320ff

    • SHA512

      0661de909c6cced8830d6740b4c3c6665634bbac34c713a667c17ad8b773995fd7f795a41152ea437e26d045196354d91c39715152fa74b4bb104d27c7a361e4

    • SSDEEP

      6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks