General

  • Target

    17e108d8ceb576ad3751fddd635f1aaf687846053d6c10fd25ce69040c35bb1d

  • Size

    33KB

  • Sample

    250630-t2gyzstkw7

  • MD5

    5cdf6c3c2661d0df3d82cd57c3befb48

  • SHA1

    a2d1e96280c9edb4c1b769b6cab309622e1ddcbc

  • SHA256

    17e108d8ceb576ad3751fddd635f1aaf687846053d6c10fd25ce69040c35bb1d

  • SHA512

    e0c1a2580b35835423fde9dc974a0a35abe2690f63cdabf340d30c237eee898618064da1600020e0a8e106d992029dce9a8f51c609df5c9f663155f4739f0663

  • SSDEEP

    768:SGJY3hfpQFJFKZj1PVs9Ag1vzbaBrOF32zzFF+OtTDMm:SGCYcx1aeg1viBxvCOt3

Malware Config

Targets

    • Target

      17e108d8ceb576ad3751fddd635f1aaf687846053d6c10fd25ce69040c35bb1d

    • Size

      33KB

    • MD5

      5cdf6c3c2661d0df3d82cd57c3befb48

    • SHA1

      a2d1e96280c9edb4c1b769b6cab309622e1ddcbc

    • SHA256

      17e108d8ceb576ad3751fddd635f1aaf687846053d6c10fd25ce69040c35bb1d

    • SHA512

      e0c1a2580b35835423fde9dc974a0a35abe2690f63cdabf340d30c237eee898618064da1600020e0a8e106d992029dce9a8f51c609df5c9f663155f4739f0663

    • SSDEEP

      768:SGJY3hfpQFJFKZj1PVs9Ag1vzbaBrOF32zzFF+OtTDMm:SGCYcx1aeg1viBxvCOt3

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v16

Tasks