General

  • Target

    d733c4a856bd5da309bae526651bbc0d1c60a4e659c627fafa3de3ef980f3c67

  • Size

    643KB

  • Sample

    250630-t4z8ca1tgy

  • MD5

    faac92779778a0c14e7110da94797199

  • SHA1

    7fb9c75b508403f50bfd730931aef6893e6e8783

  • SHA256

    d733c4a856bd5da309bae526651bbc0d1c60a4e659c627fafa3de3ef980f3c67

  • SHA512

    554731b66fe56a98dff1638b4c70e0d90cf741fc50631cf5054816d8f6592a73a3424cb7934f3b7a9d892307b2633c9ac7b03f7853b5929016e893ed8f01d1a5

  • SSDEEP

    12288:b11o5mWukhI2jFMSjysAS9X/GsfTDYrGiqNLBryHi3H2g78C9Qz1DnmQ:p1o5mWpI2jFM5sFzfTpi4LsHof7T9sH

Malware Config

Targets

    • Target

      d733c4a856bd5da309bae526651bbc0d1c60a4e659c627fafa3de3ef980f3c67

    • Size

      643KB

    • MD5

      faac92779778a0c14e7110da94797199

    • SHA1

      7fb9c75b508403f50bfd730931aef6893e6e8783

    • SHA256

      d733c4a856bd5da309bae526651bbc0d1c60a4e659c627fafa3de3ef980f3c67

    • SHA512

      554731b66fe56a98dff1638b4c70e0d90cf741fc50631cf5054816d8f6592a73a3424cb7934f3b7a9d892307b2633c9ac7b03f7853b5929016e893ed8f01d1a5

    • SSDEEP

      12288:b11o5mWukhI2jFMSjysAS9X/GsfTDYrGiqNLBryHi3H2g78C9Qz1DnmQ:p1o5mWpI2jFM5sFzfTpi4LsHof7T9sH

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v16

Tasks