General

  • Target

    32c13441dca493bbae73ec8c5786395b2b7128a00f3b6b035a2259924da9a780

  • Size

    92KB

  • Sample

    241112-tdqk8awdnp

  • MD5

    e2e5eb72402f3ac949295706e2eb0ae1

  • SHA1

    326cb6fa06e1cf684d77dfdf95adc1be3a61722e

  • SHA256

    32c13441dca493bbae73ec8c5786395b2b7128a00f3b6b035a2259924da9a780

  • SHA512

    a69b8d4ae63675638a4590d5e6999ecc1a9be908c3857586906dc21ffba1ff6eea942e6415dc86d539c122d54900fca9efce9bedfeb477f6f9357ca2de551f15

  • SSDEEP

    1536:hFcx1aeg1vjrI9U/xvyyZyapmebn4ddJZeY86iLflLJYEIs67rxo:hFf9kU0fLK4ddJMY86ipmns6S

Malware Config

Targets

    • Target

      32c13441dca493bbae73ec8c5786395b2b7128a00f3b6b035a2259924da9a780

    • Size

      92KB

    • MD5

      e2e5eb72402f3ac949295706e2eb0ae1

    • SHA1

      326cb6fa06e1cf684d77dfdf95adc1be3a61722e

    • SHA256

      32c13441dca493bbae73ec8c5786395b2b7128a00f3b6b035a2259924da9a780

    • SHA512

      a69b8d4ae63675638a4590d5e6999ecc1a9be908c3857586906dc21ffba1ff6eea942e6415dc86d539c122d54900fca9efce9bedfeb477f6f9357ca2de551f15

    • SSDEEP

      1536:hFcx1aeg1vjrI9U/xvyyZyapmebn4ddJZeY86iLflLJYEIs67rxo:hFf9kU0fLK4ddJMY86ipmns6S

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks