General

  • Target

    7e63d9480a707ee49490f753c57959a97b207212a668312dd7302df658452160.dll

  • Size

    128KB

  • Sample

    241120-dd9q4azdlp

  • MD5

    82b8e2d9302f9ddf403b5a7c608ab4b7

  • SHA1

    b2d7c36479fdec9065b4090159f1c22ce3ae78a6

  • SHA256

    7e63d9480a707ee49490f753c57959a97b207212a668312dd7302df658452160

  • SHA512

    199d62020dcef9b01cc688a5dda52598f276201bf75291010c2ff7588fd326393023c40faedcf1771180bc5cde51b5801ae4571b4c2a064680e6af2a686b8257

  • SSDEEP

    3072:pE+8OKVuMxgMLQ813qgy0ExYhnMzJkt0lDMKPX:18NcMxdLQ81amJMF7eKv

Malware Config

Targets

    • Target

      7e63d9480a707ee49490f753c57959a97b207212a668312dd7302df658452160.dll

    • Size

      128KB

    • MD5

      82b8e2d9302f9ddf403b5a7c608ab4b7

    • SHA1

      b2d7c36479fdec9065b4090159f1c22ce3ae78a6

    • SHA256

      7e63d9480a707ee49490f753c57959a97b207212a668312dd7302df658452160

    • SHA512

      199d62020dcef9b01cc688a5dda52598f276201bf75291010c2ff7588fd326393023c40faedcf1771180bc5cde51b5801ae4571b4c2a064680e6af2a686b8257

    • SSDEEP

      3072:pE+8OKVuMxgMLQ813qgy0ExYhnMzJkt0lDMKPX:18NcMxdLQ81amJMF7eKv

    • Blocklisted process makes network request

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks