General

  • Target

    1fdddbe47bdb3352e8c2aee99337c6ab5091582b203d81a1092cb92cde6899b4

  • Size

    4.6MB

  • Sample

    250701-gtcyvadk8y

  • MD5

    6fa33d49781c26215274c0492260fa86

  • SHA1

    1d9a435147d1293c311bfcc18290eb22d1f86d51

  • SHA256

    1fdddbe47bdb3352e8c2aee99337c6ab5091582b203d81a1092cb92cde6899b4

  • SHA512

    60dd3d8f91ad5c60eaa15d522a32397da1d43e9915370386b7f7108459946372830cd7c3b262a41397082b3006c590c67b52f9dd36d47210d509e545842734e8

  • SSDEEP

    98304:iLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLg:CjJa

Malware Config

Targets

    • Target

      1fdddbe47bdb3352e8c2aee99337c6ab5091582b203d81a1092cb92cde6899b4

    • Size

      4.6MB

    • MD5

      6fa33d49781c26215274c0492260fa86

    • SHA1

      1d9a435147d1293c311bfcc18290eb22d1f86d51

    • SHA256

      1fdddbe47bdb3352e8c2aee99337c6ab5091582b203d81a1092cb92cde6899b4

    • SHA512

      60dd3d8f91ad5c60eaa15d522a32397da1d43e9915370386b7f7108459946372830cd7c3b262a41397082b3006c590c67b52f9dd36d47210d509e545842734e8

    • SSDEEP

      98304:iLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLg:CjJa

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v16

Tasks