General

  • Target

    5e4dc3899fe7c708709e1c919535b83d5e3ae32bc412b460f77bd2f2ae57db34

  • Size

    33KB

  • Sample

    241112-tdpc6avlh1

  • MD5

    41f9c988b29879cfbe60a2b6dd32e777

  • SHA1

    a5e4d95d21af41193082be6abccd941df5dc687c

  • SHA256

    5e4dc3899fe7c708709e1c919535b83d5e3ae32bc412b460f77bd2f2ae57db34

  • SHA512

    1178ffd823331c16a7b77418c55858b76cb7dce7f0b876bd3a6478f958a35ecc8d808efcf76ac8739e6328359349d30c74a92ef7c8a6347bca3a098f91241ea1

  • SSDEEP

    768:hwpQFJFKZj1PVs9Ag1vzblhcCnFXNs0NfkprU/xvyy:hFcx1aeg1vjrI9U/xvyy

Malware Config

Targets

    • Target

      5e4dc3899fe7c708709e1c919535b83d5e3ae32bc412b460f77bd2f2ae57db34

    • Size

      33KB

    • MD5

      41f9c988b29879cfbe60a2b6dd32e777

    • SHA1

      a5e4d95d21af41193082be6abccd941df5dc687c

    • SHA256

      5e4dc3899fe7c708709e1c919535b83d5e3ae32bc412b460f77bd2f2ae57db34

    • SHA512

      1178ffd823331c16a7b77418c55858b76cb7dce7f0b876bd3a6478f958a35ecc8d808efcf76ac8739e6328359349d30c74a92ef7c8a6347bca3a098f91241ea1

    • SSDEEP

      768:hwpQFJFKZj1PVs9Ag1vzblhcCnFXNs0NfkprU/xvyy:hFcx1aeg1vjrI9U/xvyy

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks