General

  • Target

    27f8d7bbfe91b1ef754a445fbccc24c9da11695ca63c44a33fa12a1df338b76f.dll

  • Size

    315KB

  • Sample

    241120-cvkmvsykew

  • MD5

    8b46c170f7f8a38a8f69fa4bc2b53d61

  • SHA1

    bd61c244153364c6322a4bc9337d15dcf9c3bf00

  • SHA256

    27f8d7bbfe91b1ef754a445fbccc24c9da11695ca63c44a33fa12a1df338b76f

  • SHA512

    37fbb60a471e58ccab0aefbf530bdb3c674310b1abf7d1966493ff890119d4bcb68fe8d9b21bae13d98842811634dc8fc192801b0a94b91ed62a674477e8dabf

  • SSDEEP

    6144:YutK09bpsWYrPnP3UKLSr1TS8BbdrFucR+z+qagIK+bcgaI0b:BK0YWYrPP35LSrBS8LQ4+z+qagQYVIK

Malware Config

Targets

    • Target

      27f8d7bbfe91b1ef754a445fbccc24c9da11695ca63c44a33fa12a1df338b76f.dll

    • Size

      315KB

    • MD5

      8b46c170f7f8a38a8f69fa4bc2b53d61

    • SHA1

      bd61c244153364c6322a4bc9337d15dcf9c3bf00

    • SHA256

      27f8d7bbfe91b1ef754a445fbccc24c9da11695ca63c44a33fa12a1df338b76f

    • SHA512

      37fbb60a471e58ccab0aefbf530bdb3c674310b1abf7d1966493ff890119d4bcb68fe8d9b21bae13d98842811634dc8fc192801b0a94b91ed62a674477e8dabf

    • SSDEEP

      6144:YutK09bpsWYrPnP3UKLSr1TS8BbdrFucR+z+qagIK+bcgaI0b:BK0YWYrPP35LSrBS8LQ4+z+qagQYVIK

    • Blocklisted process makes network request

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks