General

  • Target

    08c0a35b22a19f49c4a6cbbf4c81a5ecd2558e46a0ad3cda6922c0e70dea7ac9

  • Size

    205KB

  • Sample

    250218-jx1kesypaj

  • MD5

    551433248e3c7e104b12b1d110bfdf3e

  • SHA1

    4a8bf20434705d0881d2ae8197675afe9d5433c5

  • SHA256

    08c0a35b22a19f49c4a6cbbf4c81a5ecd2558e46a0ad3cda6922c0e70dea7ac9

  • SHA512

    0a9190270cefc5fa5428ed2befdbd97e625e82ef54e4ca546bf501dc7ab12bb381186733697ac33d608b1b070c50eef0110068da25e47c97a02e17a81015dc07

  • SSDEEP

    3072:fP5gvNVLIfHQja1RfmLQADwSKkhU+tLgT5lODbiC8r1PkT:X2vnSwjaOcADw9cUeCOf

Malware Config

Targets

    • Target

      08c0a35b22a19f49c4a6cbbf4c81a5ecd2558e46a0ad3cda6922c0e70dea7ac9

    • Size

      205KB

    • MD5

      551433248e3c7e104b12b1d110bfdf3e

    • SHA1

      4a8bf20434705d0881d2ae8197675afe9d5433c5

    • SHA256

      08c0a35b22a19f49c4a6cbbf4c81a5ecd2558e46a0ad3cda6922c0e70dea7ac9

    • SHA512

      0a9190270cefc5fa5428ed2befdbd97e625e82ef54e4ca546bf501dc7ab12bb381186733697ac33d608b1b070c50eef0110068da25e47c97a02e17a81015dc07

    • SSDEEP

      3072:fP5gvNVLIfHQja1RfmLQADwSKkhU+tLgT5lODbiC8r1PkT:X2vnSwjaOcADw9cUeCOf

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks