General

  • Target

    66de14ae23c4844890f1cae605b36bd40436f51c7034a6019d109f6201d525a5

  • Size

    185KB

  • Sample

    241112-tby5ksvlfx

  • MD5

    a4a8ff6c457660a4c6ce1198c6c33ca1

  • SHA1

    2adf3b686aaa381a67c93eeb3781cface84ec43e

  • SHA256

    66de14ae23c4844890f1cae605b36bd40436f51c7034a6019d109f6201d525a5

  • SHA512

    44285be9e22f3da9beed9ea2bbe0ec9488574801c5c0850386ede013f4886923c36dbebb682293d525480e3cae8bd6ae8eb182c8a3e156106a495c0c0362612f

  • SSDEEP

    3072:hFf9kU03ARYLJXJoYtpA/H3RpDecC+EZX70RjLTu46R0Eb:b136gYLjvqXRpDecw7Kj3u46db

Malware Config

Targets

    • Target

      66de14ae23c4844890f1cae605b36bd40436f51c7034a6019d109f6201d525a5

    • Size

      185KB

    • MD5

      a4a8ff6c457660a4c6ce1198c6c33ca1

    • SHA1

      2adf3b686aaa381a67c93eeb3781cface84ec43e

    • SHA256

      66de14ae23c4844890f1cae605b36bd40436f51c7034a6019d109f6201d525a5

    • SHA512

      44285be9e22f3da9beed9ea2bbe0ec9488574801c5c0850386ede013f4886923c36dbebb682293d525480e3cae8bd6ae8eb182c8a3e156106a495c0c0362612f

    • SSDEEP

      3072:hFf9kU03ARYLJXJoYtpA/H3RpDecC+EZX70RjLTu46R0Eb:b136gYLjvqXRpDecw7Kj3u46db

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks