General

  • Target

    6e0be24460975079360bfd6f7caecad3b4d87fa1107e6832c201a2a57d68ac14

  • Size

    368KB

  • Sample

    241112-tdqafswdnm

  • MD5

    8c9db9f73890ce8a92b682a921b3cf58

  • SHA1

    1924d7ff33d7e204ef4432dc0f461b977e596b32

  • SHA256

    6e0be24460975079360bfd6f7caecad3b4d87fa1107e6832c201a2a57d68ac14

  • SHA512

    d6d258cbb11797a9baf163bf09c8a412cda6e2a88d964a08c719cf585653e0aa108b41331876561a6145a1f10ca00a09bd5ddef108df5c59da44c503029295c2

  • SSDEEP

    6144:b13JzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:b13NU66b5zhVymA/XSRh

Malware Config

Targets

    • Target

      6e0be24460975079360bfd6f7caecad3b4d87fa1107e6832c201a2a57d68ac14

    • Size

      368KB

    • MD5

      8c9db9f73890ce8a92b682a921b3cf58

    • SHA1

      1924d7ff33d7e204ef4432dc0f461b977e596b32

    • SHA256

      6e0be24460975079360bfd6f7caecad3b4d87fa1107e6832c201a2a57d68ac14

    • SHA512

      d6d258cbb11797a9baf163bf09c8a412cda6e2a88d964a08c719cf585653e0aa108b41331876561a6145a1f10ca00a09bd5ddef108df5c59da44c503029295c2

    • SSDEEP

      6144:b13JzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:b13NU66b5zhVymA/XSRh

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks