General

  • Target

    73d502ba5278933d6a92e83cd6c7553b222ee02cb5d7e55fd9e66103efa2975e

  • Size

    4.9MB

  • Sample

    250704-plkygstj19

  • MD5

    2b8f4f70f594922452dd191e9287d3e3

  • SHA1

    307f8d08a4ea5097d64d5fb7aa06f8de8be7e45d

  • SHA256

    73d502ba5278933d6a92e83cd6c7553b222ee02cb5d7e55fd9e66103efa2975e

  • SHA512

    4f74f415f2838dcefd8982cbadc4a7ca53e0c06613f336e5339d036d2b6c2f247d9dda4e7246b4b8b5f5fafd28f5ab3d4eccc8ee7ffdf07306ded49031f0d1b8

  • SSDEEP

    98304:iLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLo:0jJ6

Malware Config

Targets

    • Target

      73d502ba5278933d6a92e83cd6c7553b222ee02cb5d7e55fd9e66103efa2975e

    • Size

      4.9MB

    • MD5

      2b8f4f70f594922452dd191e9287d3e3

    • SHA1

      307f8d08a4ea5097d64d5fb7aa06f8de8be7e45d

    • SHA256

      73d502ba5278933d6a92e83cd6c7553b222ee02cb5d7e55fd9e66103efa2975e

    • SHA512

      4f74f415f2838dcefd8982cbadc4a7ca53e0c06613f336e5339d036d2b6c2f247d9dda4e7246b4b8b5f5fafd28f5ab3d4eccc8ee7ffdf07306ded49031f0d1b8

    • SSDEEP

      98304:iLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLo:0jJ6

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v16

Tasks