General

  • Target

    5d2922491b47e1c355103194e069e5ac.bin

  • Size

    13.7MB

  • Sample

    241213-bld82svrdk

  • MD5

    fd28eedb73e3a5f0408fd511bdd204b9

  • SHA1

    6292ba7a0be47fc40b311de8bf1b5830de3e7032

  • SHA256

    c7aea3f26f40402812f54de58368c81ccac2c46ee1c8c009bdfac788cd7256c7

  • SHA512

    6fa939905bc66aea9856fb9a3f865131e99fecce31ece4dfce13806132e1744122a271d0b15a490a064fb0f9ee34810e1dac4ba5aa7e7464d3f06adbe4b0d367

  • SSDEEP

    196608:qE74v692rWdzLf2C/z/nmorrShDnaWSb1373tbMyKkO+Yvz4YhkORCCdwoyRCbUP:q+x3OC/jdGFS57dbMygPRRp5yAbqE4F

Malware Config

Targets

    • Target

      c348002e3d2cf40a2fc3c819a96b1735dc451bb3ec32ba9355feaccd3eee63c0.msi

    • Size

      13.8MB

    • MD5

      5d2922491b47e1c355103194e069e5ac

    • SHA1

      eb918f926c9cc2f9239f1dfe0380727c8170982c

    • SHA256

      c348002e3d2cf40a2fc3c819a96b1735dc451bb3ec32ba9355feaccd3eee63c0

    • SHA512

      522be674a5fb20af9a4fa42315ae8e780df3310f5b0ea8feccca1cf788cd6af542226aed65e9c6f7353d2daf954522f4067880626a2ccf4b7793178b57eb0bd9

    • SSDEEP

      393216:GDFCbAjiImi73v4JPUQ6Rm1feeuQx1qbvto:GRCbAjCK6PEm12ZQx1qbFo

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks