General

  • Target

    48f57545e22a7a68214781735f258390fb0cc0494a3bd74b19704bc22fda5d1c

  • Size

    447KB

  • Sample

    241121-hettgstpgl

  • MD5

    71eebcc8dde40d7c339aa6d4aa947576

  • SHA1

    99ae9c812d992335a3c7d7cd139d2b5955fe82f6

  • SHA256

    48f57545e22a7a68214781735f258390fb0cc0494a3bd74b19704bc22fda5d1c

  • SHA512

    441f302143be42a2d88075e6aeeb1afa879de49d462adc641e8e1293c746fd4bc4ea079f504e6534a8841a445ff306c05a8c410538f9bd820cc530da12013bc8

  • SSDEEP

    12288:K03Nb8A65XwlYgrHy6V17kr8+m73q+pgkxzdxRlabQYtCAZ5cIkKix:K03NmwlBrygOW3q49ldx7XIa

Malware Config

Targets

    • Target

      48f57545e22a7a68214781735f258390fb0cc0494a3bd74b19704bc22fda5d1c

    • Size

      447KB

    • MD5

      71eebcc8dde40d7c339aa6d4aa947576

    • SHA1

      99ae9c812d992335a3c7d7cd139d2b5955fe82f6

    • SHA256

      48f57545e22a7a68214781735f258390fb0cc0494a3bd74b19704bc22fda5d1c

    • SHA512

      441f302143be42a2d88075e6aeeb1afa879de49d462adc641e8e1293c746fd4bc4ea079f504e6534a8841a445ff306c05a8c410538f9bd820cc530da12013bc8

    • SSDEEP

      12288:K03Nb8A65XwlYgrHy6V17kr8+m73q+pgkxzdxRlabQYtCAZ5cIkKix:K03NmwlBrygOW3q49ldx7XIa

    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks