General

  • Target

    d9fb02c488cc8b45df9bfcb17fe722b23fd5a0b6b63ffe810a2749fde1ccf69a

  • Size

    127KB

  • Sample

    240311-td8f2aah34

  • MD5

    86215c256ec57cc76e6fec0cdc5a12ca

  • SHA1

    c4f8732bfb38fae87814efc232eb988bb0b1f801

  • SHA256

    d9fb02c488cc8b45df9bfcb17fe722b23fd5a0b6b63ffe810a2749fde1ccf69a

  • SHA512

    127cfeb33ca0ac86bbd08966f3820524d7bb1af9440bb71d1a48e3070ecafcab5df9fc921b1a369bbacd6c40a6012a56ffa4bfcedb51eb08276f9ee461292b4b

  • SSDEEP

    3072:vOjWuyt0RsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPB:vI89OKofHfHTXQLzgvnzHPowYbvrjD/g

Malware Config

Targets

    • Target

      d9fb02c488cc8b45df9bfcb17fe722b23fd5a0b6b63ffe810a2749fde1ccf69a

    • Size

      127KB

    • MD5

      86215c256ec57cc76e6fec0cdc5a12ca

    • SHA1

      c4f8732bfb38fae87814efc232eb988bb0b1f801

    • SHA256

      d9fb02c488cc8b45df9bfcb17fe722b23fd5a0b6b63ffe810a2749fde1ccf69a

    • SHA512

      127cfeb33ca0ac86bbd08966f3820524d7bb1af9440bb71d1a48e3070ecafcab5df9fc921b1a369bbacd6c40a6012a56ffa4bfcedb51eb08276f9ee461292b4b

    • SSDEEP

      3072:vOjWuyt0RsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPB:vI89OKofHfHTXQLzgvnzHPowYbvrjD/g

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks