Resubmissions

14-01-2025 15:52

250114-ta8ydsskfx 8

14-01-2025 15:47

250114-s8nvfatqen 8

14-01-2025 15:45

250114-s7gpqstqcq 3

General

  • Target

    sample

  • Size

    4KB

  • Sample

    250114-ta8ydsskfx

  • MD5

    636dda5207c6cce1716578b5718a39b6

  • SHA1

    c5e8fa98ec7cf323f0ac946ecbf6ae612699dece

  • SHA256

    0ca390091f158fd125d984f09098b8f069bbad079cbdc1f1045df78f0339893d

  • SHA512

    f613b65cf74bd077694545db833c4283ad236ec3ce9eaeb296eecdaef0ff620e04b9c7e0922a481986222c8916ad24401b1305d733a6b14a5b8298a30888909e

  • SSDEEP

    48:Jv3nmA2B1wjPIJlPJlfJlGJlOk57TFQ/POp/ssT:heB1wjklhlRlClOk57RQ/POp/s2

Malware Config

Targets

    • Target

      sample

    • Size

      4KB

    • MD5

      636dda5207c6cce1716578b5718a39b6

    • SHA1

      c5e8fa98ec7cf323f0ac946ecbf6ae612699dece

    • SHA256

      0ca390091f158fd125d984f09098b8f069bbad079cbdc1f1045df78f0339893d

    • SHA512

      f613b65cf74bd077694545db833c4283ad236ec3ce9eaeb296eecdaef0ff620e04b9c7e0922a481986222c8916ad24401b1305d733a6b14a5b8298a30888909e

    • SSDEEP

      48:Jv3nmA2B1wjPIJlPJlfJlGJlOk57TFQ/POp/ssT:heB1wjklhlRlClOk57RQ/POp/s2

    • Downloads MZ/PE file

    • A potential corporate email address has been identified in the URL: [email protected]

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Detected potential entity reuse from brand PAYPAL.

MITRE ATT&CK Enterprise v15

Tasks