General

  • Target

    29a3738dd5db114f6f8e0e463dd240ea83eb66e25bd1cdc3f977a8423ecb4d39

  • Size

    200KB

  • Sample

    241110-f9ft1azngy

  • MD5

    0825e8f0b921ec9c69d2fe5e8902bcf4

  • SHA1

    5c7e762329dad1682b345949aa3613b74283b90b

  • SHA256

    29a3738dd5db114f6f8e0e463dd240ea83eb66e25bd1cdc3f977a8423ecb4d39

  • SHA512

    84379ee4038eced7576c80a41737c554e21b8b76038d423bfec7f0a594339d7e01c082d3bacc3103afbf90ce8225af48a4539bcaf4760cab0e353b82e0a6dd84

  • SSDEEP

    3072:fP5gvNVLIfHQja1RfmLQADwSKkhU+tLgT5lODbiC8r1PkT:X2vnSwjaOcADw9cUeCOf

Malware Config

Targets

    • Target

      29a3738dd5db114f6f8e0e463dd240ea83eb66e25bd1cdc3f977a8423ecb4d39

    • Size

      200KB

    • MD5

      0825e8f0b921ec9c69d2fe5e8902bcf4

    • SHA1

      5c7e762329dad1682b345949aa3613b74283b90b

    • SHA256

      29a3738dd5db114f6f8e0e463dd240ea83eb66e25bd1cdc3f977a8423ecb4d39

    • SHA512

      84379ee4038eced7576c80a41737c554e21b8b76038d423bfec7f0a594339d7e01c082d3bacc3103afbf90ce8225af48a4539bcaf4760cab0e353b82e0a6dd84

    • SSDEEP

      3072:fP5gvNVLIfHQja1RfmLQADwSKkhU+tLgT5lODbiC8r1PkT:X2vnSwjaOcADw9cUeCOf

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks