General

  • Target

    54c9987e1009efdfb0f859e68949a1a152cb06e04e7a29dd6cc5aa80773966f7

  • Size

    368KB

  • Sample

    250630-t2hkhstkx2

  • MD5

    ca23ed25edc86f81c238bf36e758e262

  • SHA1

    3193b4abba99c124c68dd7e32b6eaae50f247261

  • SHA256

    54c9987e1009efdfb0f859e68949a1a152cb06e04e7a29dd6cc5aa80773966f7

  • SHA512

    3a048f7bd81717b7809c494baf73b016eec964299d15e0c975a55441d01345876618247d424a23841bf6bf7837b3a285c7abcdba1a29a87c6f83b2fe39d6c8d9

  • SSDEEP

    6144:b11oqzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:b11NU66b5zhVymA/XSRh

Malware Config

Targets

    • Target

      54c9987e1009efdfb0f859e68949a1a152cb06e04e7a29dd6cc5aa80773966f7

    • Size

      368KB

    • MD5

      ca23ed25edc86f81c238bf36e758e262

    • SHA1

      3193b4abba99c124c68dd7e32b6eaae50f247261

    • SHA256

      54c9987e1009efdfb0f859e68949a1a152cb06e04e7a29dd6cc5aa80773966f7

    • SHA512

      3a048f7bd81717b7809c494baf73b016eec964299d15e0c975a55441d01345876618247d424a23841bf6bf7837b3a285c7abcdba1a29a87c6f83b2fe39d6c8d9

    • SSDEEP

      6144:b11oqzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:b11NU66b5zhVymA/XSRh

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v16

Tasks