Resubmissions

04-12-2024 18:15

241204-wv462szmdl 7

04-12-2024 18:09

241204-wrsnvatqhz 3

04-12-2024 17:59

241204-wk44asyrfp 8

General

  • Target

    F-15CASE.py

  • Size

    17KB

  • Sample

    241204-wk44asyrfp

  • MD5

    1580f49e48a5b344f32510c474f8046d

  • SHA1

    a1a0d74245597b056f154c1f66f86a2dac1fed34

  • SHA256

    82154f748a22bb1941b31a591af1ec6d73d694b410b6e337a2f72d6fbb4b4ea2

  • SHA512

    6d620e6159af85760d351790829cd5c28af10c7fcdba9028c9386256bd2de0bec943bd77467f8619eec9a3095666e71600b0ef37f1210eed62535d82d89de6a2

  • SSDEEP

    384:Evl2Xaka4tEEq4WjAHPRSgeCtHnonzPKq9IEBfrer+vW:EvAonDvBfra

Malware Config

Targets

    • Target

      F-15CASE.py

    • Size

      17KB

    • MD5

      1580f49e48a5b344f32510c474f8046d

    • SHA1

      a1a0d74245597b056f154c1f66f86a2dac1fed34

    • SHA256

      82154f748a22bb1941b31a591af1ec6d73d694b410b6e337a2f72d6fbb4b4ea2

    • SHA512

      6d620e6159af85760d351790829cd5c28af10c7fcdba9028c9386256bd2de0bec943bd77467f8619eec9a3095666e71600b0ef37f1210eed62535d82d89de6a2

    • SSDEEP

      384:Evl2Xaka4tEEq4WjAHPRSgeCtHnonzPKq9IEBfrer+vW:EvAonDvBfra

    • Downloads MZ/PE file

    • A potential corporate email address has been identified in the URL: =@L

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

MITRE ATT&CK Enterprise v15

Tasks