General

  • Target

    8efcf1b53e659ad1cb2b59179b447f18

  • Size

    1.5MB

  • Sample

    240204-m5pdxaabal

  • MD5

    8efcf1b53e659ad1cb2b59179b447f18

  • SHA1

    b5fbca7d35d9f58c69bd742959da94a11bd13941

  • SHA256

    9e797fa163a36f59dd5a5b4e38ddd7e83142e5e4e8f3d2719236cdfb7b5eb90f

  • SHA512

    d64acea7669ff40a84c32e834201743f6a44e4f33b4c0e39426cb3c39e977114d4c856d84312e80487b8ccbc10a5545049162b115abae4bca7a1289dc1a90abf

  • SSDEEP

    24576:i31YOjN9qtf/Bfj5Xx41tOrvN+ZWp4FdwoIXauQGIKXENBM16QuEEgAka1y:U9etB9S7ykK46XV2BM1huElJaI

Malware Config

Targets

    • Target

      8efcf1b53e659ad1cb2b59179b447f18

    • Size

      1.5MB

    • MD5

      8efcf1b53e659ad1cb2b59179b447f18

    • SHA1

      b5fbca7d35d9f58c69bd742959da94a11bd13941

    • SHA256

      9e797fa163a36f59dd5a5b4e38ddd7e83142e5e4e8f3d2719236cdfb7b5eb90f

    • SHA512

      d64acea7669ff40a84c32e834201743f6a44e4f33b4c0e39426cb3c39e977114d4c856d84312e80487b8ccbc10a5545049162b115abae4bca7a1289dc1a90abf

    • SSDEEP

      24576:i31YOjN9qtf/Bfj5Xx41tOrvN+ZWp4FdwoIXauQGIKXENBM16QuEEgAka1y:U9etB9S7ykK46XV2BM1huElJaI

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks