General

  • Target

    cf2ab03db6de2837f9ee4d819560707290f64352512193bb9373d7352babd424

  • Size

    577KB

  • Sample

    250630-t4bjzstky4

  • MD5

    fcdbd6c02fb5627899a0595134005b74

  • SHA1

    ca22a1bc8c39b4d941741165d1670281be457c2c

  • SHA256

    cf2ab03db6de2837f9ee4d819560707290f64352512193bb9373d7352babd424

  • SHA512

    11196dffe9832802edb2e57f5a7024bd15a762100abe91302349d6ba6c2c27095bcb75d31907a3cf716b48a13555502204bc8a5a007628aea4e1af4d44683c2c

  • SSDEEP

    6144:b11o8E7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4t0BHQQG:b11A7a3iwbihym2g7XO3LWUQfh4Co

Malware Config

Targets

    • Target

      cf2ab03db6de2837f9ee4d819560707290f64352512193bb9373d7352babd424

    • Size

      577KB

    • MD5

      fcdbd6c02fb5627899a0595134005b74

    • SHA1

      ca22a1bc8c39b4d941741165d1670281be457c2c

    • SHA256

      cf2ab03db6de2837f9ee4d819560707290f64352512193bb9373d7352babd424

    • SHA512

      11196dffe9832802edb2e57f5a7024bd15a762100abe91302349d6ba6c2c27095bcb75d31907a3cf716b48a13555502204bc8a5a007628aea4e1af4d44683c2c

    • SSDEEP

      6144:b11o8E7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4t0BHQQG:b11A7a3iwbihym2g7XO3LWUQfh4Co

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v16

Tasks