General

  • Target

    67ebd2c64edd10cbdde6acf558ac9c766db0c4222201c2d9be1f911f25aec6ed

  • Size

    7.0MB

  • Sample

    250704-x8ph7axwfy

  • MD5

    8f48234b266dc03dd3aea307eee53128

  • SHA1

    ce06cd442f47d3c43b99196464e55695278791b5

  • SHA256

    67ebd2c64edd10cbdde6acf558ac9c766db0c4222201c2d9be1f911f25aec6ed

  • SHA512

    53497ab14b2b006545f50db99aa3d81b6fb759e90f30899c9ae317753adfe86651332b9ba74ffbf057f50ba7025f5b9ef032a56746c717df218d209312540408

  • SSDEEP

    98304:iLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLg:0jJu

Malware Config

Targets

    • Target

      67ebd2c64edd10cbdde6acf558ac9c766db0c4222201c2d9be1f911f25aec6ed

    • Size

      7.0MB

    • MD5

      8f48234b266dc03dd3aea307eee53128

    • SHA1

      ce06cd442f47d3c43b99196464e55695278791b5

    • SHA256

      67ebd2c64edd10cbdde6acf558ac9c766db0c4222201c2d9be1f911f25aec6ed

    • SHA512

      53497ab14b2b006545f50db99aa3d81b6fb759e90f30899c9ae317753adfe86651332b9ba74ffbf057f50ba7025f5b9ef032a56746c717df218d209312540408

    • SSDEEP

      98304:iLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLg:0jJu

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v16

Tasks