General

  • Target

    53dca045ed329be97a87a21936e44fe28aa599aceb40d86a77b2ff22e0b35ef3

  • Size

    202KB

  • Sample

    241110-f5f9zaznay

  • MD5

    99e8630cb3cd51c1ab62f1c78eb72823

  • SHA1

    b6d0123f7213e44805faab3738570fda6b013ee6

  • SHA256

    53dca045ed329be97a87a21936e44fe28aa599aceb40d86a77b2ff22e0b35ef3

  • SHA512

    b6bd5dcb0df92824c4a8a60fae42de31ddaa6c8064c92e6b3e5e5884b2dd6d13f9aab827dac56fdd60144eb18f9efa7818fc758c3c20ad77fb1b121265b96856

  • SSDEEP

    3072:fP5gvNVLIfHQja1RfmLQADwSKkhU+tLgT5lODbiC8r1PkT:X2vnSwjaOcADw9cUeCOf

Malware Config

Targets

    • Target

      53dca045ed329be97a87a21936e44fe28aa599aceb40d86a77b2ff22e0b35ef3

    • Size

      202KB

    • MD5

      99e8630cb3cd51c1ab62f1c78eb72823

    • SHA1

      b6d0123f7213e44805faab3738570fda6b013ee6

    • SHA256

      53dca045ed329be97a87a21936e44fe28aa599aceb40d86a77b2ff22e0b35ef3

    • SHA512

      b6bd5dcb0df92824c4a8a60fae42de31ddaa6c8064c92e6b3e5e5884b2dd6d13f9aab827dac56fdd60144eb18f9efa7818fc758c3c20ad77fb1b121265b96856

    • SSDEEP

      3072:fP5gvNVLIfHQja1RfmLQADwSKkhU+tLgT5lODbiC8r1PkT:X2vnSwjaOcADw9cUeCOf

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks