General

  • Target

    dbf92f8c6d2c64d33dc6248b4c660f65df730a4b38715a448d704a3da8babbd6

  • Size

    1.1MB

  • Sample

    250401-tptf9a11a1

  • MD5

    4c9959f9d1db195e6323d48e5d176fe1

  • SHA1

    d752ae365569da9649cf7d9f31d2a81add78b65a

  • SHA256

    dbf92f8c6d2c64d33dc6248b4c660f65df730a4b38715a448d704a3da8babbd6

  • SHA512

    c6445de5ae013d17bcff6e95930aba5fb62026b54e2c3827b2dc4c07bd7ccbb0ab6b1d03764b55f1fac70c82660ba585a20db293659203143615814dbae3c4b1

  • SSDEEP

    24576:T3Nef9AiKGpEoQpkN2C4McuKo0GTNJpyT5RGeQa0s:Tde+GtCi27mVHyT+a0s

Malware Config

Targets

    • Target

      dbf92f8c6d2c64d33dc6248b4c660f65df730a4b38715a448d704a3da8babbd6

    • Size

      1.1MB

    • MD5

      4c9959f9d1db195e6323d48e5d176fe1

    • SHA1

      d752ae365569da9649cf7d9f31d2a81add78b65a

    • SHA256

      dbf92f8c6d2c64d33dc6248b4c660f65df730a4b38715a448d704a3da8babbd6

    • SHA512

      c6445de5ae013d17bcff6e95930aba5fb62026b54e2c3827b2dc4c07bd7ccbb0ab6b1d03764b55f1fac70c82660ba585a20db293659203143615814dbae3c4b1

    • SSDEEP

      24576:T3Nef9AiKGpEoQpkN2C4McuKo0GTNJpyT5RGeQa0s:Tde+GtCi27mVHyT+a0s

    • Drops file in Drivers directory

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks