General

  • Target

    ff0370d1b18faaf22d4aeb262b27434e814d61a1dc76054761a62973bb8eb5ca

  • Size

    577KB

  • Sample

    241112-r7rz2avemj

  • MD5

    8c44769ee54f300904021ff95612af39

  • SHA1

    4bbedf8aa0ac87a7855198f6f9b67659e3725b38

  • SHA256

    ff0370d1b18faaf22d4aeb262b27434e814d61a1dc76054761a62973bb8eb5ca

  • SHA512

    ee626293d94aae0db6e129f2b271a268b9a1ffd119330dfde642d39439dbc59aceae9286348be935bd65eeaf4314f1482dfa9dc4a2085a4a202a89deedfc0964

  • SSDEEP

    6144:d5+aX3LdE7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4t0BE:b+ai7a3iwbihym2g7XO3LWUQfh4Co

Malware Config

Targets

    • Target

      ff0370d1b18faaf22d4aeb262b27434e814d61a1dc76054761a62973bb8eb5ca

    • Size

      577KB

    • MD5

      8c44769ee54f300904021ff95612af39

    • SHA1

      4bbedf8aa0ac87a7855198f6f9b67659e3725b38

    • SHA256

      ff0370d1b18faaf22d4aeb262b27434e814d61a1dc76054761a62973bb8eb5ca

    • SHA512

      ee626293d94aae0db6e129f2b271a268b9a1ffd119330dfde642d39439dbc59aceae9286348be935bd65eeaf4314f1482dfa9dc4a2085a4a202a89deedfc0964

    • SSDEEP

      6144:d5+aX3LdE7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4t0BE:b+ai7a3iwbihym2g7XO3LWUQfh4Co

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks