General

  • Target

    8f81580c5dec332414d4cee9f40edd6b26e64458f34ee3410360dcf6bcf42bcb.dll

  • Size

    206KB

  • Sample

    241120-djjf4ayglc

  • MD5

    c5736b37501b61f7c64e7ef6286f6289

  • SHA1

    1a0a94d72d06e52933909dcfcc990501c0fa7215

  • SHA256

    8f81580c5dec332414d4cee9f40edd6b26e64458f34ee3410360dcf6bcf42bcb

  • SHA512

    d56f49d12071b502b7141832bfec5fc9a4e5b31ccc8be79b0df8f053006667bb2fa85f77ecf2bf64b213e4ff56c6ce05c3780e4883a6a3ae39c95551431f6523

  • SSDEEP

    3072:rWM5Dd5F4fXT9lePIdmpcS/sTftc8zNuhJi4zGUGrXcOC:rf+ePIdsDETftc8BuhJi4zGUGrg

Malware Config

Targets

    • Target

      8f81580c5dec332414d4cee9f40edd6b26e64458f34ee3410360dcf6bcf42bcb.dll

    • Size

      206KB

    • MD5

      c5736b37501b61f7c64e7ef6286f6289

    • SHA1

      1a0a94d72d06e52933909dcfcc990501c0fa7215

    • SHA256

      8f81580c5dec332414d4cee9f40edd6b26e64458f34ee3410360dcf6bcf42bcb

    • SHA512

      d56f49d12071b502b7141832bfec5fc9a4e5b31ccc8be79b0df8f053006667bb2fa85f77ecf2bf64b213e4ff56c6ce05c3780e4883a6a3ae39c95551431f6523

    • SSDEEP

      3072:rWM5Dd5F4fXT9lePIdmpcS/sTftc8zNuhJi4zGUGrXcOC:rf+ePIdsDETftc8BuhJi4zGUGrg

    • Blocklisted process makes network request

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks