General

  • Target

    efd355ee5b65dc7da1a45bec70ce1983f07f125db78fa8923fe0ccb13bd4210f

  • Size

    5.7MB

  • Sample

    241112-r7rn9svemf

  • MD5

    691a623a8edda70de4c0a9f4b852bcf3

  • SHA1

    d5e085abac278ca32154e77d9fe33eae392512fb

  • SHA256

    efd355ee5b65dc7da1a45bec70ce1983f07f125db78fa8923fe0ccb13bd4210f

  • SHA512

    5c92cf50202ed38ce08f38e5250830c5e4fc5ceee71513ca5ab09235773eff3cc972a38ee8ecbf0e177a6db2421be39dc978ea6c2ae52508d4515e38a794a045

  • SSDEEP

    49152:bBsPv94AEsKU8ggw1g+1CART5eBiyKS3EI3wybn20DCYIHvc8ixuZm9+fWsw6dTP:bEKUgTH2M2m9UMpu1QfLczqssnKSk

Malware Config

Targets

    • Target

      efd355ee5b65dc7da1a45bec70ce1983f07f125db78fa8923fe0ccb13bd4210f

    • Size

      5.7MB

    • MD5

      691a623a8edda70de4c0a9f4b852bcf3

    • SHA1

      d5e085abac278ca32154e77d9fe33eae392512fb

    • SHA256

      efd355ee5b65dc7da1a45bec70ce1983f07f125db78fa8923fe0ccb13bd4210f

    • SHA512

      5c92cf50202ed38ce08f38e5250830c5e4fc5ceee71513ca5ab09235773eff3cc972a38ee8ecbf0e177a6db2421be39dc978ea6c2ae52508d4515e38a794a045

    • SSDEEP

      49152:bBsPv94AEsKU8ggw1g+1CART5eBiyKS3EI3wybn20DCYIHvc8ixuZm9+fWsw6dTP:bEKUgTH2M2m9UMpu1QfLczqssnKSk

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks