General

  • Target

    66b05198714d00ca62085a223a5f602bc100d9342449c466cdc658091d555972.dll

  • Size

    291KB

  • Sample

    241120-c99wasynet

  • MD5

    50ff394db0e48b51160101010c77a9e9

  • SHA1

    c28cbbe2cd48023b74cbf161803b4c6fa5bd1e5d

  • SHA256

    66b05198714d00ca62085a223a5f602bc100d9342449c466cdc658091d555972

  • SHA512

    8edbb65dbfbd8ef2cfcad6cc9f852e4a7c888ce2583fcbed0ccc32ddb031a13a05a1ad7e97aa18d78fca29f3a182f1710ae826588bcb7ae5f99d2d6581d34564

  • SSDEEP

    6144:LT5L0mONfbiVDYm1Pot04jJDLCp+ET4bJWbuG:H263P+x7yZ6G

Malware Config

Targets

    • Target

      66b05198714d00ca62085a223a5f602bc100d9342449c466cdc658091d555972.dll

    • Size

      291KB

    • MD5

      50ff394db0e48b51160101010c77a9e9

    • SHA1

      c28cbbe2cd48023b74cbf161803b4c6fa5bd1e5d

    • SHA256

      66b05198714d00ca62085a223a5f602bc100d9342449c466cdc658091d555972

    • SHA512

      8edbb65dbfbd8ef2cfcad6cc9f852e4a7c888ce2583fcbed0ccc32ddb031a13a05a1ad7e97aa18d78fca29f3a182f1710ae826588bcb7ae5f99d2d6581d34564

    • SSDEEP

      6144:LT5L0mONfbiVDYm1Pot04jJDLCp+ET4bJWbuG:H263P+x7yZ6G

    • Blocklisted process makes network request

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks