General

  • Target

    e13e1d8ba61e8aa1b912551310594c61b7e593a6c32f9d74513cc898b1d230a3

  • Size

    3.1MB

  • Sample

    241114-p8wy9syng1

  • MD5

    8cd0a7290c74c21b852ce5766b619b62

  • SHA1

    3b5044f19c0bd33c4f562ba2703befbdd369c099

  • SHA256

    e13e1d8ba61e8aa1b912551310594c61b7e593a6c32f9d74513cc898b1d230a3

  • SHA512

    22e03ec3cf4cc2e6257210c3f656a07390862ba563e5875e18d88f50c3b567b7ed3baf382b05d6c6679f6bcfbe413bd66e82e7b0859618a7b647d9bca2c898d9

  • SSDEEP

    98304:MAJbF/eB26JB6+hafAQ2NFSrsf9qgMsIZ/JUFmRT2H:JGpafS0U9q0IFYz

Malware Config

Targets

    • Target

      e13e1d8ba61e8aa1b912551310594c61b7e593a6c32f9d74513cc898b1d230a3

    • Size

      3.1MB

    • MD5

      8cd0a7290c74c21b852ce5766b619b62

    • SHA1

      3b5044f19c0bd33c4f562ba2703befbdd369c099

    • SHA256

      e13e1d8ba61e8aa1b912551310594c61b7e593a6c32f9d74513cc898b1d230a3

    • SHA512

      22e03ec3cf4cc2e6257210c3f656a07390862ba563e5875e18d88f50c3b567b7ed3baf382b05d6c6679f6bcfbe413bd66e82e7b0859618a7b647d9bca2c898d9

    • SSDEEP

      98304:MAJbF/eB26JB6+hafAQ2NFSrsf9qgMsIZ/JUFmRT2H:JGpafS0U9q0IFYz

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks