General

  • Target

    9a8527b44228fa6d0c3fb4d08ecf51c04b0c568faa34b889da0764378d5504a6

  • Size

    577KB

  • Sample

    241112-te8heswdqq

  • MD5

    52dcd6ff6b7a16ab407ee78967072de1

  • SHA1

    2842ee4a0f37ddce158fde839771070a662f2ca3

  • SHA256

    9a8527b44228fa6d0c3fb4d08ecf51c04b0c568faa34b889da0764378d5504a6

  • SHA512

    b4966b8a990273fd456f5d9dccd1d69f8b6cf84633b9d097f5b412da886dfd4f5dfa74505ff166501d4410a3ced723f8a281aeb2665a821bc008c3c2f699a8b2

  • SSDEEP

    6144:b13TE7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4t0BHQQfu:b13A7a3iwbihym2g7XO3LWUQfh4Co

Malware Config

Targets

    • Target

      9a8527b44228fa6d0c3fb4d08ecf51c04b0c568faa34b889da0764378d5504a6

    • Size

      577KB

    • MD5

      52dcd6ff6b7a16ab407ee78967072de1

    • SHA1

      2842ee4a0f37ddce158fde839771070a662f2ca3

    • SHA256

      9a8527b44228fa6d0c3fb4d08ecf51c04b0c568faa34b889da0764378d5504a6

    • SHA512

      b4966b8a990273fd456f5d9dccd1d69f8b6cf84633b9d097f5b412da886dfd4f5dfa74505ff166501d4410a3ced723f8a281aeb2665a821bc008c3c2f699a8b2

    • SSDEEP

      6144:b13TE7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4t0BHQQfu:b13A7a3iwbihym2g7XO3LWUQfh4Co

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks