General

  • Target

    358db2000d8cacd0670e1175dda3714177580c7de6f1cfcaeedff4e0075dfe48

  • Size

    6.7MB

  • Sample

    250704-plj17atj18

  • MD5

    67db49882d5ad823f801571d30d7add1

  • SHA1

    c690b1ef1976c11ffb586097dc3adc05b51d0894

  • SHA256

    358db2000d8cacd0670e1175dda3714177580c7de6f1cfcaeedff4e0075dfe48

  • SHA512

    b452411cf8330fdc8fdf8d376ab43f2036d9d2698a8ba6f26ccb0dc359d53d827cd08208b549aeb76cd8f19c7aaeecf4c9a35df8c9679afb12f56b25c453be36

  • SSDEEP

    98304:iLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLx:CjJ7

Malware Config

Targets

    • Target

      358db2000d8cacd0670e1175dda3714177580c7de6f1cfcaeedff4e0075dfe48

    • Size

      6.7MB

    • MD5

      67db49882d5ad823f801571d30d7add1

    • SHA1

      c690b1ef1976c11ffb586097dc3adc05b51d0894

    • SHA256

      358db2000d8cacd0670e1175dda3714177580c7de6f1cfcaeedff4e0075dfe48

    • SHA512

      b452411cf8330fdc8fdf8d376ab43f2036d9d2698a8ba6f26ccb0dc359d53d827cd08208b549aeb76cd8f19c7aaeecf4c9a35df8c9679afb12f56b25c453be36

    • SSDEEP

      98304:iLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLx:CjJ7

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v16

Tasks