General

  • Target

    43509eb7637b09aa509d42f8f1b1f0302c2bd8520e3c62ca9cb74b70aa4eb038.exe

  • Size

    86KB

  • Sample

    241119-vekxssyhkn

  • MD5

    b70f3a2c277901ebbd8b09c24cd57ff9

  • SHA1

    ecc8df26ffd0cb53ce29ce9bc4d4c10cd2024442

  • SHA256

    43509eb7637b09aa509d42f8f1b1f0302c2bd8520e3c62ca9cb74b70aa4eb038

  • SHA512

    ffb444dfba678b42b256d813020a5cc5c8b21801620605f2e5457dde143390a16552b2449baf1d2bad499bf3d9f28e13a2ad672c8f09b6e04227d91f2edac8a6

  • SSDEEP

    1536:qG14P477AxUYrZGoC09k0SkTRHhWqPRN6Cs:qGSQ7sDU/ySkNAqa

Malware Config

Targets

    • Target

      43509eb7637b09aa509d42f8f1b1f0302c2bd8520e3c62ca9cb74b70aa4eb038.exe

    • Size

      86KB

    • MD5

      b70f3a2c277901ebbd8b09c24cd57ff9

    • SHA1

      ecc8df26ffd0cb53ce29ce9bc4d4c10cd2024442

    • SHA256

      43509eb7637b09aa509d42f8f1b1f0302c2bd8520e3c62ca9cb74b70aa4eb038

    • SHA512

      ffb444dfba678b42b256d813020a5cc5c8b21801620605f2e5457dde143390a16552b2449baf1d2bad499bf3d9f28e13a2ad672c8f09b6e04227d91f2edac8a6

    • SSDEEP

      1536:qG14P477AxUYrZGoC09k0SkTRHhWqPRN6Cs:qGSQ7sDU/ySkNAqa

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks