General

  • Target

    sample

  • Size

    18KB

  • Sample

    241120-vwb18a1ank

  • MD5

    bfe218195170695d7ce8638abe31224d

  • SHA1

    ec377be28a62936aa9be7d01f498a3126392d1c3

  • SHA256

    6a17463f218298687055875ffab26c88282b83c24bdc9cbd954128ebba38742a

  • SHA512

    49ace18c1ecbdd8717a46873088a9a2a55fb493d34df7b9f1b6aedaa076e9b90bb1fdcb3cbcf141ef731dfb9b4722da1ac251e89437f2abc1e1702594ec5d4bf

  • SSDEEP

    384:1KVWwE1ocy4r4lbGaRMvhpN/YZeTYRlObz6r0sZmL2f31xCejiw:0VM1ocy4EEaGJpNQZ0bz6r0sZmLUlxPF

Malware Config

Targets

    • Target

      sample

    • Size

      18KB

    • MD5

      bfe218195170695d7ce8638abe31224d

    • SHA1

      ec377be28a62936aa9be7d01f498a3126392d1c3

    • SHA256

      6a17463f218298687055875ffab26c88282b83c24bdc9cbd954128ebba38742a

    • SHA512

      49ace18c1ecbdd8717a46873088a9a2a55fb493d34df7b9f1b6aedaa076e9b90bb1fdcb3cbcf141ef731dfb9b4722da1ac251e89437f2abc1e1702594ec5d4bf

    • SSDEEP

      384:1KVWwE1ocy4r4lbGaRMvhpN/YZeTYRlObz6r0sZmL2f31xCejiw:0VM1ocy4EEaGJpNQZ0bz6r0sZmLUlxPF

    • Downloads MZ/PE file

    • A potential corporate email address has been identified in the URL: [email protected]

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

MITRE ATT&CK Enterprise v15

Tasks