General

  • Target

    dba9c2268b1ee590b4b3b456642c6c7aa6993b9d.dll

  • Size

    171KB

  • Sample

    241119-p6c4daxaqp

  • MD5

    129a4a5be1e9cff7a54ebf6b80793986

  • SHA1

    dba9c2268b1ee590b4b3b456642c6c7aa6993b9d

  • SHA256

    a80d66f921a6f59756560ae3c3afd26fdd43e26f30ecabdd729c80301a8d08ce

  • SHA512

    2d71d88ff8c8854bacbd6689abd54e739c482b5605295bd9ffea1b06078b4e9f1f6f1072bb03b9cf255cd50a8f28da9bd762c3c3ca950d7165932e89940611fd

  • SSDEEP

    3072:R2Iz9CI8mUOtDDPwLkBLXLDFkKmvzXBpLHYmmO1QezRd7UcPa1xMjM7A:Rjz9X8mXGUXVPmr9mOzRd7UcPKoMk

Malware Config

Targets

    • Target

      dba9c2268b1ee590b4b3b456642c6c7aa6993b9d.dll

    • Size

      171KB

    • MD5

      129a4a5be1e9cff7a54ebf6b80793986

    • SHA1

      dba9c2268b1ee590b4b3b456642c6c7aa6993b9d

    • SHA256

      a80d66f921a6f59756560ae3c3afd26fdd43e26f30ecabdd729c80301a8d08ce

    • SHA512

      2d71d88ff8c8854bacbd6689abd54e739c482b5605295bd9ffea1b06078b4e9f1f6f1072bb03b9cf255cd50a8f28da9bd762c3c3ca950d7165932e89940611fd

    • SSDEEP

      3072:R2Iz9CI8mUOtDDPwLkBLXLDFkKmvzXBpLHYmmO1QezRd7UcPa1xMjM7A:Rjz9X8mXGUXVPmr9mOzRd7UcPKoMk

    • Blocklisted process makes network request

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks