General

  • Target

    ae13a3c246c501ed2e224b99afa783f6eb65f78e586c8a179ebf094a77bb5afa

  • Size

    394KB

  • Sample

    250125-c9p6wstjbr

  • MD5

    89e153719570b46f306cbd62645e6d01

  • SHA1

    0856f5c6d40759480d2b684b6eda78ad679e17d8

  • SHA256

    ae13a3c246c501ed2e224b99afa783f6eb65f78e586c8a179ebf094a77bb5afa

  • SHA512

    97b35e658b032e6cd0cae0e46ac83aa42af3b6e13ebd1911121414d36a3786fe77c426d77e9a92d51c2441c6273e7bfd5948d3bc68a2d95ba10eb31ff28bd696

  • SSDEEP

    6144:SR46tGfC0jRP2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGuz:SR3WFjiahVy41

Malware Config

Targets

    • Target

      ae13a3c246c501ed2e224b99afa783f6eb65f78e586c8a179ebf094a77bb5afa

    • Size

      394KB

    • MD5

      89e153719570b46f306cbd62645e6d01

    • SHA1

      0856f5c6d40759480d2b684b6eda78ad679e17d8

    • SHA256

      ae13a3c246c501ed2e224b99afa783f6eb65f78e586c8a179ebf094a77bb5afa

    • SHA512

      97b35e658b032e6cd0cae0e46ac83aa42af3b6e13ebd1911121414d36a3786fe77c426d77e9a92d51c2441c6273e7bfd5948d3bc68a2d95ba10eb31ff28bd696

    • SSDEEP

      6144:SR46tGfC0jRP2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGuz:SR3WFjiahVy41

    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks