General
-
Target
OZD Payment Information TT784677U.scr
-
Size
1.1MB
-
Sample
210227-zwqq9fsp4a
-
MD5
05e699f1763f039ca9f696ef520c3b1e
-
SHA1
e9dbd4a76a1ede5f201a849f9ba4d5cd1b35d796
-
SHA256
ae8189a4bb0e5d94c656e530686caed2b724cfe2def4febecca71288280fd275
-
SHA512
7d98738252993857f76267e45115bcf7cd3d9db7460ab47eef041437f936408998d0a3029f572884706cce2e70db0dda223a4db7079a0d423cd82e7eb12c94c8
Static task
static1
Behavioral task
behavioral1
Sample
OZD Payment Information TT784677U.scr
Resource
win7v20201028
Malware Config
Targets
-
-
Target
OZD Payment Information TT784677U.scr
-
Size
1.1MB
-
MD5
05e699f1763f039ca9f696ef520c3b1e
-
SHA1
e9dbd4a76a1ede5f201a849f9ba4d5cd1b35d796
-
SHA256
ae8189a4bb0e5d94c656e530686caed2b724cfe2def4febecca71288280fd275
-
SHA512
7d98738252993857f76267e45115bcf7cd3d9db7460ab47eef041437f936408998d0a3029f572884706cce2e70db0dda223a4db7079a0d423cd82e7eb12c94c8
-
BitRAT Payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-