General

  • Target

    4d177b1a7e2988ce2f0822b0bf3047358735cbb21145507e25b2a62d2be19deb

  • Size

    369KB

  • Sample

    241120-fkg1rssckm

  • MD5

    29bd6c5df89740aa8652a07c05a6c31d

  • SHA1

    637e1bb2173c0da069141f4ea149a65c6912ed59

  • SHA256

    4d177b1a7e2988ce2f0822b0bf3047358735cbb21145507e25b2a62d2be19deb

  • SHA512

    4b99c69f2ee8ebd848489d935601f32f019b14062962c9833e6c3dd6108712c25eb2e66a9afa7214afc5fc32e45e197f320ff3169d0ea2e5a5e7802911ba172e

  • SSDEEP

    6144:d046tGdye41jzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:d03NbVU66b5zhVymA/XSRh

Malware Config

Targets

    • Target

      4d177b1a7e2988ce2f0822b0bf3047358735cbb21145507e25b2a62d2be19deb

    • Size

      369KB

    • MD5

      29bd6c5df89740aa8652a07c05a6c31d

    • SHA1

      637e1bb2173c0da069141f4ea149a65c6912ed59

    • SHA256

      4d177b1a7e2988ce2f0822b0bf3047358735cbb21145507e25b2a62d2be19deb

    • SHA512

      4b99c69f2ee8ebd848489d935601f32f019b14062962c9833e6c3dd6108712c25eb2e66a9afa7214afc5fc32e45e197f320ff3169d0ea2e5a5e7802911ba172e

    • SSDEEP

      6144:d046tGdye41jzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:d03NbVU66b5zhVymA/XSRh

    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks