General

  • Target

    d1f9d36b91707dc3ee1b6aae3d5ca4d0d6b66e59cb72d6804677ab0ffb72e958

  • Size

    410KB

  • Sample

    241121-jqfaxa1bjk

  • MD5

    449697d16fd75d8b5b96ba555b7b5fbc

  • SHA1

    4c33a024649cd61a5a64af40d2c8aed43f5f6f76

  • SHA256

    d1f9d36b91707dc3ee1b6aae3d5ca4d0d6b66e59cb72d6804677ab0ffb72e958

  • SHA512

    23b58358af4c63365474c6ff6852617e6af2589d2a1c26df8b8a6a15af90ab84746c58f19b153a0955b05ca19fd58c88e76907fa0a9c3457c21ce85bd57c47ad

  • SSDEEP

    6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse

Malware Config

Targets

    • Target

      d1f9d36b91707dc3ee1b6aae3d5ca4d0d6b66e59cb72d6804677ab0ffb72e958

    • Size

      410KB

    • MD5

      449697d16fd75d8b5b96ba555b7b5fbc

    • SHA1

      4c33a024649cd61a5a64af40d2c8aed43f5f6f76

    • SHA256

      d1f9d36b91707dc3ee1b6aae3d5ca4d0d6b66e59cb72d6804677ab0ffb72e958

    • SHA512

      23b58358af4c63365474c6ff6852617e6af2589d2a1c26df8b8a6a15af90ab84746c58f19b153a0955b05ca19fd58c88e76907fa0a9c3457c21ce85bd57c47ad

    • SSDEEP

      6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks