General

  • Target

    bae82162306a46262950a431a0c2308866e7f317f72cd5ed657478739db9bfcf

  • Size

    3.4MB

  • Sample

    241121-lbfdgavpfk

  • MD5

    4549445a51481f7585aea2867711c7da

  • SHA1

    644adbb7671866f24589da05285df8182b768121

  • SHA256

    bae82162306a46262950a431a0c2308866e7f317f72cd5ed657478739db9bfcf

  • SHA512

    727396f8421a83faf5959b6045abe303f7e2a3f6340b303740b570957b061ccdba705912f05940b5966517a7cfefb799596fa935eaaf97fca1c73bdda0e9456b

  • SSDEEP

    98304:pWnL1M2XNmcGCVIps5phuIMAbvbJaJNQqPAbsU8968Vum8z22:pWu2Qcvlh9vbvWobIbG3

Malware Config

Targets

    • Target

      bae82162306a46262950a431a0c2308866e7f317f72cd5ed657478739db9bfcf

    • Size

      3.4MB

    • MD5

      4549445a51481f7585aea2867711c7da

    • SHA1

      644adbb7671866f24589da05285df8182b768121

    • SHA256

      bae82162306a46262950a431a0c2308866e7f317f72cd5ed657478739db9bfcf

    • SHA512

      727396f8421a83faf5959b6045abe303f7e2a3f6340b303740b570957b061ccdba705912f05940b5966517a7cfefb799596fa935eaaf97fca1c73bdda0e9456b

    • SSDEEP

      98304:pWnL1M2XNmcGCVIps5phuIMAbvbJaJNQqPAbsU8968Vum8z22:pWu2Qcvlh9vbvWobIbG3

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks