General

  • Target

    ae1faa54cc0e8c272cac85561fbb4f2e131694d803d684007a024e574709fb73

  • Size

    394KB

  • Sample

    241120-fkg1rssckl

  • MD5

    3af1d5b1bedf1c9d68e122a61104c73c

  • SHA1

    5e34e94b284562aa2a955a54a136c852ad8b881e

  • SHA256

    ae1faa54cc0e8c272cac85561fbb4f2e131694d803d684007a024e574709fb73

  • SHA512

    3d57f6b7e587526fd1dbab2a95383a34bbf12f28dc89d5bb3affffe8dbd339ed4924b9e96922c1aef875d8bd498d050c0c6681c525ebb759fae31f6fb28384dd

  • SSDEEP

    6144:d046tGdye412P2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGY:d03NbZahVy41

Malware Config

Targets

    • Target

      ae1faa54cc0e8c272cac85561fbb4f2e131694d803d684007a024e574709fb73

    • Size

      394KB

    • MD5

      3af1d5b1bedf1c9d68e122a61104c73c

    • SHA1

      5e34e94b284562aa2a955a54a136c852ad8b881e

    • SHA256

      ae1faa54cc0e8c272cac85561fbb4f2e131694d803d684007a024e574709fb73

    • SHA512

      3d57f6b7e587526fd1dbab2a95383a34bbf12f28dc89d5bb3affffe8dbd339ed4924b9e96922c1aef875d8bd498d050c0c6681c525ebb759fae31f6fb28384dd

    • SSDEEP

      6144:d046tGdye412P2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGY:d03NbZahVy41

    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks