General

  • Target

    3340354029daa5b9d7c6cf70ba07a9f713544e02beb1efa2980056b914e16964N.exe

  • Size

    171KB

  • Sample

    250120-kycqes1rfj

  • MD5

    c46894c8d773ea26fc91e52bddbe6320

  • SHA1

    1cd84a1c2f67cce482a9a4d416e66294cf8d1d45

  • SHA256

    3340354029daa5b9d7c6cf70ba07a9f713544e02beb1efa2980056b914e16964

  • SHA512

    9b4625fb946160edfe57650279dec6c5bab26344a2c49fab5206b6462d2f1b5c96ed4adbd92ed705886845ed182c25581e965d4583a46e20359bf581d94bd58d

  • SSDEEP

    3072:Gnr29ph7jXsmeK6ncKJQALI34b/Vkx7Ek8TAoLefHxzt48SG5KRXhN5FKMgI:W2XtjXmK6cAQJNElb6dPURN5Fpg

Malware Config

Targets

    • Target

      3340354029daa5b9d7c6cf70ba07a9f713544e02beb1efa2980056b914e16964N.exe

    • Size

      171KB

    • MD5

      c46894c8d773ea26fc91e52bddbe6320

    • SHA1

      1cd84a1c2f67cce482a9a4d416e66294cf8d1d45

    • SHA256

      3340354029daa5b9d7c6cf70ba07a9f713544e02beb1efa2980056b914e16964

    • SHA512

      9b4625fb946160edfe57650279dec6c5bab26344a2c49fab5206b6462d2f1b5c96ed4adbd92ed705886845ed182c25581e965d4583a46e20359bf581d94bd58d

    • SSDEEP

      3072:Gnr29ph7jXsmeK6ncKJQALI34b/Vkx7Ek8TAoLefHxzt48SG5KRXhN5FKMgI:W2XtjXmK6cAQJNElb6dPURN5Fpg

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks