General

  • Target

    05b4b17a240b317825adfa17e1e24134bec93bc6a5f14a9656af03e535c2a326

  • Size

    410KB

  • Sample

    241121-jlz5hsvjcj

  • MD5

    899656822e0bd0f7be4df000e611ef5e

  • SHA1

    df5a38821474abb3c09c9a42845683ddfc9f999f

  • SHA256

    05b4b17a240b317825adfa17e1e24134bec93bc6a5f14a9656af03e535c2a326

  • SHA512

    1805d39483e6e27b1b1fec6468f905b4a0e4bfca8f023f5f12a3a768e2259288bd9b76c64c677e8fbaa05145130e4414c1668e3f58d5e4fd967b4da695356175

  • SSDEEP

    6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4p:gtRfJcNYFNm8UhlZGsep

Malware Config

Targets

    • Target

      05b4b17a240b317825adfa17e1e24134bec93bc6a5f14a9656af03e535c2a326

    • Size

      410KB

    • MD5

      899656822e0bd0f7be4df000e611ef5e

    • SHA1

      df5a38821474abb3c09c9a42845683ddfc9f999f

    • SHA256

      05b4b17a240b317825adfa17e1e24134bec93bc6a5f14a9656af03e535c2a326

    • SHA512

      1805d39483e6e27b1b1fec6468f905b4a0e4bfca8f023f5f12a3a768e2259288bd9b76c64c677e8fbaa05145130e4414c1668e3f58d5e4fd967b4da695356175

    • SSDEEP

      6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4p:gtRfJcNYFNm8UhlZGsep

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks