General

  • Target

    9f79ed51c51057b765256f856cd3690737c98fce.dll

  • Size

    315KB

  • Sample

    241119-n3g3gsvhqa

  • MD5

    703dd9fac2280e224a1949db0cf545a3

  • SHA1

    9f79ed51c51057b765256f856cd3690737c98fce

  • SHA256

    5397c40c0f4bbe1b202069a612b03dac27a0c33eeec7ac97df264b9afbb84da4

  • SHA512

    69e3b4cf81bf8c5e2a944f22bf145442415882712957c1a64c051ad3a89b5dd9cd1247f2331fc429295bfda244799263bcebb347bcdc09339f7875c19af493d0

  • SSDEEP

    6144:YutK09bpsWYrPnP3UKLSr1TS8BbdrFucR+z+qagIK+bcgaI0C:BK0YWYrPP35LSrBS8LQ4+z+qagQYVIv

Malware Config

Targets

    • Target

      9f79ed51c51057b765256f856cd3690737c98fce.dll

    • Size

      315KB

    • MD5

      703dd9fac2280e224a1949db0cf545a3

    • SHA1

      9f79ed51c51057b765256f856cd3690737c98fce

    • SHA256

      5397c40c0f4bbe1b202069a612b03dac27a0c33eeec7ac97df264b9afbb84da4

    • SHA512

      69e3b4cf81bf8c5e2a944f22bf145442415882712957c1a64c051ad3a89b5dd9cd1247f2331fc429295bfda244799263bcebb347bcdc09339f7875c19af493d0

    • SSDEEP

      6144:YutK09bpsWYrPnP3UKLSr1TS8BbdrFucR+z+qagIK+bcgaI0C:BK0YWYrPP35LSrBS8LQ4+z+qagQYVIv

    • Blocklisted process makes network request

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks