General

  • Target

    42ba0abd056a21a6952ce7d67c1206c5c0224fc904a1afc1a0c0db3065888cc2N.exe

  • Size

    367KB

  • Sample

    241124-agrsxatpav

  • MD5

    792237af452c295939c9697662525590

  • SHA1

    6e4698e23a377f761ffd4f317bf5dbd7373482b2

  • SHA256

    42ba0abd056a21a6952ce7d67c1206c5c0224fc904a1afc1a0c0db3065888cc2

  • SHA512

    b5623f2d273e8d50c0246f666ef3c804d54c8dd82d2cf07df562a0a0d03493551c9b87c1aee03784ec4f98ad5df26e759e31be74e825cd4992b0fea7eb26ad57

  • SSDEEP

    6144:0RoSgWLkT+YPhLKU301oP0HOi4KETrOED2RWOF/09:vSfLkKShL930iP0ui4KETrO6+W4/09

Malware Config

Targets

    • Target

      42ba0abd056a21a6952ce7d67c1206c5c0224fc904a1afc1a0c0db3065888cc2N.exe

    • Size

      367KB

    • MD5

      792237af452c295939c9697662525590

    • SHA1

      6e4698e23a377f761ffd4f317bf5dbd7373482b2

    • SHA256

      42ba0abd056a21a6952ce7d67c1206c5c0224fc904a1afc1a0c0db3065888cc2

    • SHA512

      b5623f2d273e8d50c0246f666ef3c804d54c8dd82d2cf07df562a0a0d03493551c9b87c1aee03784ec4f98ad5df26e759e31be74e825cd4992b0fea7eb26ad57

    • SSDEEP

      6144:0RoSgWLkT+YPhLKU301oP0HOi4KETrOED2RWOF/09:vSfLkKShL930iP0ui4KETrO6+W4/09

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks