General

  • Target

    2d81e87085b99ddaccc7d58179426c9cf39d02d572dcc481be227c27bf288893

  • Size

    141KB

  • Sample

    250125-c9p6wstjbq

  • MD5

    2fb51c7043d4c1f4e4017f14c03f2066

  • SHA1

    a72c0944dfa7549a08c0a49679b79b9bf29c7715

  • SHA256

    2d81e87085b99ddaccc7d58179426c9cf39d02d572dcc481be227c27bf288893

  • SHA512

    4b2a1715db7cf7eca7def242ea857741b8c58d753314f3dc2b35fce0ef97b6e18d3243b824016344f6ca7d65a28248cd5f9c093c8191b04ebb08d4df6dcc145c

  • SSDEEP

    3072:JA/aY46tGNFC0VF+sRYHKreCC0XUq2yiqzv6z4AXrB4APHCv:SR46tGfC0jJYHKreQ32hlBG

Malware Config

Targets

    • Target

      2d81e87085b99ddaccc7d58179426c9cf39d02d572dcc481be227c27bf288893

    • Size

      141KB

    • MD5

      2fb51c7043d4c1f4e4017f14c03f2066

    • SHA1

      a72c0944dfa7549a08c0a49679b79b9bf29c7715

    • SHA256

      2d81e87085b99ddaccc7d58179426c9cf39d02d572dcc481be227c27bf288893

    • SHA512

      4b2a1715db7cf7eca7def242ea857741b8c58d753314f3dc2b35fce0ef97b6e18d3243b824016344f6ca7d65a28248cd5f9c093c8191b04ebb08d4df6dcc145c

    • SSDEEP

      3072:JA/aY46tGNFC0VF+sRYHKreCC0XUq2yiqzv6z4AXrB4APHCv:SR46tGfC0jJYHKreQ32hlBG

    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks