General

  • Target

    9f8caadebb53a74160288548e432a894e8e5f8bf14068d1868f60938474faeb9N.exe

  • Size

    81KB

  • Sample

    241119-w4j78svkdq

  • MD5

    9791cb5c9c1839a8b425f64d61ab97f0

  • SHA1

    6930f005b7660c486f326e3ab84558645d67de51

  • SHA256

    9f8caadebb53a74160288548e432a894e8e5f8bf14068d1868f60938474faeb9

  • SHA512

    3d9fce727f7bdf73597999fb8c10be83b97ec8c8e3ee382e57d9d5eed5fe449f3367264521e44654f2ed29cad41ab92148e9903e70d57a670e498f9920f5b8ad

  • SSDEEP

    1536:lCbhjW8rhK4rg6Z1qdkMB5eIO292XbNTx9sy8ifyXxyk3D3Wfn25B76Ps06DcBqy:QbhjWfe/+dkg4ZfWiKAC3W67E5nBqy

Malware Config

Targets

    • Target

      9f8caadebb53a74160288548e432a894e8e5f8bf14068d1868f60938474faeb9N.exe

    • Size

      81KB

    • MD5

      9791cb5c9c1839a8b425f64d61ab97f0

    • SHA1

      6930f005b7660c486f326e3ab84558645d67de51

    • SHA256

      9f8caadebb53a74160288548e432a894e8e5f8bf14068d1868f60938474faeb9

    • SHA512

      3d9fce727f7bdf73597999fb8c10be83b97ec8c8e3ee382e57d9d5eed5fe449f3367264521e44654f2ed29cad41ab92148e9903e70d57a670e498f9920f5b8ad

    • SSDEEP

      1536:lCbhjW8rhK4rg6Z1qdkMB5eIO292XbNTx9sy8ifyXxyk3D3Wfn25B76Ps06DcBqy:QbhjWfe/+dkg4ZfWiKAC3W67E5nBqy

    • Blocklisted process makes network request

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks