General

  • Target

    ed6b8d381cba57f7d9301ea2a39717f5ec4c27f339e9a805fc1bf6824b3024d0

  • Size

    584KB

  • Sample

    250630-t2g9ra1tew

  • MD5

    8481650e48d8aae3d4b13cc53df369b2

  • SHA1

    98d36a4c591b8c33a48c82e3a5bd5e457d11945d

  • SHA256

    ed6b8d381cba57f7d9301ea2a39717f5ec4c27f339e9a805fc1bf6824b3024d0

  • SHA512

    1719dc5631bb29d247911430a2d9d443b9043c8099e8a2481bc1a61ae505c49a2241f6edeeaa5347c58fa2bc7550a15c04c7ddd961753dd71c957e7d8dbb3483

  • SSDEEP

    12288:rjzdjzdjzdjzdjzdjzdjzdjzdjzdjzdjzdjzdg:jhhhhhhhhhhhdg

Malware Config

Targets

    • Target

      ed6b8d381cba57f7d9301ea2a39717f5ec4c27f339e9a805fc1bf6824b3024d0

    • Size

      584KB

    • MD5

      8481650e48d8aae3d4b13cc53df369b2

    • SHA1

      98d36a4c591b8c33a48c82e3a5bd5e457d11945d

    • SHA256

      ed6b8d381cba57f7d9301ea2a39717f5ec4c27f339e9a805fc1bf6824b3024d0

    • SHA512

      1719dc5631bb29d247911430a2d9d443b9043c8099e8a2481bc1a61ae505c49a2241f6edeeaa5347c58fa2bc7550a15c04c7ddd961753dd71c957e7d8dbb3483

    • SSDEEP

      12288:rjzdjzdjzdjzdjzdjzdjzdjzdjzdjzdjzdjzdg:jhhhhhhhhhhhdg

    • Modifies visibility of file extensions in Explorer

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v16

Tasks