General

  • Target

    e7a85e8e4336f8e477f7581a5df88f248fbaefc33f83efa1609eac6950b83453

  • Size

    11.1MB

  • Sample

    241112-tb1y6swdjn

  • MD5

    f045a4caf4ef125eeb35c963c4ddd7d4

  • SHA1

    cdd4ec30394ace39616018250bca2ca12bd9460c

  • SHA256

    e7a85e8e4336f8e477f7581a5df88f248fbaefc33f83efa1609eac6950b83453

  • SHA512

    8bdf6f7fcbecdd7878a7fa5b7bb056ffe736b7eb76e8ace0a106d34581c369c34e2be01c9b0d8a432fbb4e257a564a51edaa50fe838f32622b90e50869969b76

  • SSDEEP

    98304:qb+0ChEPIGiq3y3vx+w9TbfjJ+kdfpK46Tle36jknz9Y:g+kIGv3y/x+KTbfjJ+kdnAlejY

Malware Config

Targets

    • Target

      e7a85e8e4336f8e477f7581a5df88f248fbaefc33f83efa1609eac6950b83453

    • Size

      11.1MB

    • MD5

      f045a4caf4ef125eeb35c963c4ddd7d4

    • SHA1

      cdd4ec30394ace39616018250bca2ca12bd9460c

    • SHA256

      e7a85e8e4336f8e477f7581a5df88f248fbaefc33f83efa1609eac6950b83453

    • SHA512

      8bdf6f7fcbecdd7878a7fa5b7bb056ffe736b7eb76e8ace0a106d34581c369c34e2be01c9b0d8a432fbb4e257a564a51edaa50fe838f32622b90e50869969b76

    • SSDEEP

      98304:qb+0ChEPIGiq3y3vx+w9TbfjJ+kdfpK46Tle36jknz9Y:g+kIGv3y/x+KTbfjJ+kdnAlejY

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks