General

  • Target

    0e94c714635ba84785d53b474eca360a321f60742e268447363d6d3d06dfe3bc

  • Size

    3.1MB

  • Sample

    241121-l9kqvawjar

  • MD5

    d39a39c8a74a146d6094c2d63df5a7bd

  • SHA1

    a5df59891f6d74266bf398979f8fa676426c1773

  • SHA256

    0e94c714635ba84785d53b474eca360a321f60742e268447363d6d3d06dfe3bc

  • SHA512

    546291d0c1119d75d84620763697eb117afaf0199c8a04038138694b82375273eefc7005116068c4f6ecca8cc45f5841d60b17c77a7424bf79e5cc70a8ae4ac2

  • SSDEEP

    98304:qAJbF/eB26JB6+hafAQ2NFSrsf9qgMsIZ/JUFmRT2H:jGpafS0U9q0IFYz

Malware Config

Targets

    • Target

      0e94c714635ba84785d53b474eca360a321f60742e268447363d6d3d06dfe3bc

    • Size

      3.1MB

    • MD5

      d39a39c8a74a146d6094c2d63df5a7bd

    • SHA1

      a5df59891f6d74266bf398979f8fa676426c1773

    • SHA256

      0e94c714635ba84785d53b474eca360a321f60742e268447363d6d3d06dfe3bc

    • SHA512

      546291d0c1119d75d84620763697eb117afaf0199c8a04038138694b82375273eefc7005116068c4f6ecca8cc45f5841d60b17c77a7424bf79e5cc70a8ae4ac2

    • SSDEEP

      98304:qAJbF/eB26JB6+hafAQ2NFSrsf9qgMsIZ/JUFmRT2H:jGpafS0U9q0IFYz

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks