General

  • Target

    backgroundTaskHost.exe

  • Size

    49KB

  • Sample

    241207-dt4j1syrbn

  • MD5

    8bde0ae40012bd639fc60e494cc32356

  • SHA1

    422ae532bc5ee74b13ee0be406a62c706b81f7ec

  • SHA256

    b7d2c17e0038945aa4b72ae7a89e54d29b04ccc0feb62df5c9b7b67de43c2530

  • SHA512

    64dc6fafbe6ed242304d2df1c8c1581101bdea97290d7aaa26d5a465eb9145f8e31617f4e55d5487af43d9ebce8f4e39a997b37af808983f6a4ba75c05dd8a0d

  • SSDEEP

    384:10ZoYK6BABHcYLWKGWydDBRJeHR9z37zk:1VBHRZad1Pc9zr4

Malware Config

Targets

    • Target

      backgroundTaskHost.exe

    • Size

      49KB

    • MD5

      8bde0ae40012bd639fc60e494cc32356

    • SHA1

      422ae532bc5ee74b13ee0be406a62c706b81f7ec

    • SHA256

      b7d2c17e0038945aa4b72ae7a89e54d29b04ccc0feb62df5c9b7b67de43c2530

    • SHA512

      64dc6fafbe6ed242304d2df1c8c1581101bdea97290d7aaa26d5a465eb9145f8e31617f4e55d5487af43d9ebce8f4e39a997b37af808983f6a4ba75c05dd8a0d

    • SSDEEP

      384:10ZoYK6BABHcYLWKGWydDBRJeHR9z37zk:1VBHRZad1Pc9zr4

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Detected potential entity reuse from brand MICROSOFT.

MITRE ATT&CK Enterprise v15

Tasks