General

  • Target

    2a9d2ee578beb9b61da312eebd4536980371a2030f5c5fdab883fb1f6f3b4aa5

  • Size

    365KB

  • Sample

    221029-ktq29aaehj

  • MD5

    f14e55bd05db5ee4a296e6701526bf33

  • SHA1

    da4b120ab625165c3864187615aeb0fb37398928

  • SHA256

    2a9d2ee578beb9b61da312eebd4536980371a2030f5c5fdab883fb1f6f3b4aa5

  • SHA512

    d51634a000543c7eba204f12b477cc2106f7e0619eca2165b6fc059116885b4596ac1072d4e629b2ca201b58d78342037901bdf3119c19b9dd677dca8092b0f9

  • SSDEEP

    6144:ihk8knu5jGR85+DdLqDcrblgGBVwttYAs1PDy4jEfBd58hRrk62W66pnJVuaFdBY:iOJuxGO5SxBgGsYhm4a83rNpXpnJVNVY

Malware Config

Targets

    • Target

      2a9d2ee578beb9b61da312eebd4536980371a2030f5c5fdab883fb1f6f3b4aa5

    • Size

      365KB

    • MD5

      f14e55bd05db5ee4a296e6701526bf33

    • SHA1

      da4b120ab625165c3864187615aeb0fb37398928

    • SHA256

      2a9d2ee578beb9b61da312eebd4536980371a2030f5c5fdab883fb1f6f3b4aa5

    • SHA512

      d51634a000543c7eba204f12b477cc2106f7e0619eca2165b6fc059116885b4596ac1072d4e629b2ca201b58d78342037901bdf3119c19b9dd677dca8092b0f9

    • SSDEEP

      6144:ihk8knu5jGR85+DdLqDcrblgGBVwttYAs1PDy4jEfBd58hRrk62W66pnJVuaFdBY:iOJuxGO5SxBgGsYhm4a83rNpXpnJVNVY

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks