General

  • Target

    48f391aa7a7812ffd052874795df367490edcaf22c13c1a14841c297c693edc3.exe

  • Size

    160KB

  • Sample

    241120-c3xbmatlfk

  • MD5

    1c3fa910ec45c6f23efc30abac859c8c

  • SHA1

    c747306c42543a4896728631f3c75c86c93d3fbc

  • SHA256

    48f391aa7a7812ffd052874795df367490edcaf22c13c1a14841c297c693edc3

  • SHA512

    8ab9bd8837a274102ccb6dddc6223ba4bdce8d13997228cd8d4e8ac8557c60d75f91ed00d080eea156dc1fcf78c844910da60da60ae7ce0df20fb4bd6741870d

  • SSDEEP

    3072:iGjK99QR809vb8AryfxFhurI6nhDrNT3WOcmPWTEcR283brWjNnnCPcQEFK:i8Ah0J8hfzQrTn1B3WOfWwcYuboNnnCz

Malware Config

Targets

    • Target

      48f391aa7a7812ffd052874795df367490edcaf22c13c1a14841c297c693edc3.exe

    • Size

      160KB

    • MD5

      1c3fa910ec45c6f23efc30abac859c8c

    • SHA1

      c747306c42543a4896728631f3c75c86c93d3fbc

    • SHA256

      48f391aa7a7812ffd052874795df367490edcaf22c13c1a14841c297c693edc3

    • SHA512

      8ab9bd8837a274102ccb6dddc6223ba4bdce8d13997228cd8d4e8ac8557c60d75f91ed00d080eea156dc1fcf78c844910da60da60ae7ce0df20fb4bd6741870d

    • SSDEEP

      3072:iGjK99QR809vb8AryfxFhurI6nhDrNT3WOcmPWTEcR283brWjNnnCPcQEFK:i8Ah0J8hfzQrTn1B3WOfWwcYuboNnnCz

    • Blocklisted process makes network request

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks