General

  • Target

    13389341451d925f9adda53d96b61c34d2e9e6c015518d1c0972e333c0f10d85.exe

  • Size

    638KB

  • Sample

    241206-fz127askby

  • MD5

    b341f5ab68a8455d187ef2db86d71def

  • SHA1

    e68c26be8392a4e144e877be7547e864bdf05377

  • SHA256

    13389341451d925f9adda53d96b61c34d2e9e6c015518d1c0972e333c0f10d85

  • SHA512

    45a9ff459909aac6a72ae61573864e60fcc48e99b406afe9c8b741740831334119e11e85ae7614a78033da341d9d1a21e380b6a8549882741cde52034d16cc6b

  • SSDEEP

    12288:iRRRaMMMMM2MMMMM/JS2f47CQOcHJW6/5P+B8+8EnAf5:iRRRaMMMMM2MMMMM/JS7C5KW05mB8+7i

Malware Config

Targets

    • Target

      13389341451d925f9adda53d96b61c34d2e9e6c015518d1c0972e333c0f10d85.exe

    • Size

      638KB

    • MD5

      b341f5ab68a8455d187ef2db86d71def

    • SHA1

      e68c26be8392a4e144e877be7547e864bdf05377

    • SHA256

      13389341451d925f9adda53d96b61c34d2e9e6c015518d1c0972e333c0f10d85

    • SHA512

      45a9ff459909aac6a72ae61573864e60fcc48e99b406afe9c8b741740831334119e11e85ae7614a78033da341d9d1a21e380b6a8549882741cde52034d16cc6b

    • SSDEEP

      12288:iRRRaMMMMM2MMMMM/JS2f47CQOcHJW6/5P+B8+8EnAf5:iRRRaMMMMM2MMMMM/JS7C5KW05mB8+7i

    • Expiro family

    • Expiro, m0yv

      Expiro aka m0yv is a multi-functional backdoor written in C++.

    • Expiro payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Drops Chrome extension

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks