General

  • Target

    794c20c8d6f3b427552d69a6203d08d4140bffa4de5848ab6f8fda2aefcb24d0.exe

  • Size

    396KB

  • Sample

    241119-lth73svblr

  • MD5

    e9a4ee4501e517a1f0975bbd55737303

  • SHA1

    69ba1b7ba832b0bee2279f8dfcc1a4fd83eefb0f

  • SHA256

    794c20c8d6f3b427552d69a6203d08d4140bffa4de5848ab6f8fda2aefcb24d0

  • SHA512

    c85ec1da78a38be290134d54b3b3cb53a9a636ed0402d851ab401fe436d5bd92d788fd9aa9151894f17854c609f4542b86e0a20cef97684e2ef9ff3e56e9ec15

  • SSDEEP

    12288:vdDU6g13sJd1fm/+yb3O2jg82ydU/DdKumhb:vdE3sJd1fm/+yb3OYg84/JHyb

Malware Config

Targets

    • Target

      794c20c8d6f3b427552d69a6203d08d4140bffa4de5848ab6f8fda2aefcb24d0.exe

    • Size

      396KB

    • MD5

      e9a4ee4501e517a1f0975bbd55737303

    • SHA1

      69ba1b7ba832b0bee2279f8dfcc1a4fd83eefb0f

    • SHA256

      794c20c8d6f3b427552d69a6203d08d4140bffa4de5848ab6f8fda2aefcb24d0

    • SHA512

      c85ec1da78a38be290134d54b3b3cb53a9a636ed0402d851ab401fe436d5bd92d788fd9aa9151894f17854c609f4542b86e0a20cef97684e2ef9ff3e56e9ec15

    • SSDEEP

      12288:vdDU6g13sJd1fm/+yb3O2jg82ydU/DdKumhb:vdE3sJd1fm/+yb3OYg84/JHyb

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks