General

  • Target

    96a05ce86593cb66fdbd5c050ebd4172c956e9fce957b451cd7d695b591b5224

  • Size

    118KB

  • Sample

    240126-w3929sdcdr

  • MD5

    c6c66835d21c0def69d12bd90c649d91

  • SHA1

    68d5104e0290c8ca499f42e0c87e841da5585e40

  • SHA256

    96a05ce86593cb66fdbd5c050ebd4172c956e9fce957b451cd7d695b591b5224

  • SHA512

    f7a8c97c7f5249b6a4b0319ce3abbb8bb549f3834dc30bd8351d92749fffd3823e3ab9970657dbaba573bb53c1a6976f38316add53673812c46c724d2e9b0d1b

  • SSDEEP

    3072:8OjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPb:8Is9OKofHfHTXQLzgvnzHPowYbvrjD/m

Malware Config

Targets

    • Target

      96a05ce86593cb66fdbd5c050ebd4172c956e9fce957b451cd7d695b591b5224

    • Size

      118KB

    • MD5

      c6c66835d21c0def69d12bd90c649d91

    • SHA1

      68d5104e0290c8ca499f42e0c87e841da5585e40

    • SHA256

      96a05ce86593cb66fdbd5c050ebd4172c956e9fce957b451cd7d695b591b5224

    • SHA512

      f7a8c97c7f5249b6a4b0319ce3abbb8bb549f3834dc30bd8351d92749fffd3823e3ab9970657dbaba573bb53c1a6976f38316add53673812c46c724d2e9b0d1b

    • SSDEEP

      3072:8OjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPb:8Is9OKofHfHTXQLzgvnzHPowYbvrjD/m

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks