General

  • Target

    bc4ef06e40a3d73ce35f361d3a2e365f8eb88f5fc5b07d653bf20ff1b5c34202

  • Size

    127KB

  • Sample

    240313-dft4esbc2v

  • MD5

    13cee777aadedf3a6b3a7fc83455f9be

  • SHA1

    5bfb0649aa20b5e7ed2c1a76b606968afd33384a

  • SHA256

    bc4ef06e40a3d73ce35f361d3a2e365f8eb88f5fc5b07d653bf20ff1b5c34202

  • SHA512

    3e283bc98fa71091c721276971d2928916a443a9f3a9a83e6925e267b37239a07482095f29192bea392e5d478904ce5e449a03cd00c6c99ce52d667531a6fa7d

  • SSDEEP

    3072:vOjjuAt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPp:vzu9OKofHfHTXQLzgvnzHPowYbvrjD/s

Malware Config

Targets

    • Target

      bc4ef06e40a3d73ce35f361d3a2e365f8eb88f5fc5b07d653bf20ff1b5c34202

    • Size

      127KB

    • MD5

      13cee777aadedf3a6b3a7fc83455f9be

    • SHA1

      5bfb0649aa20b5e7ed2c1a76b606968afd33384a

    • SHA256

      bc4ef06e40a3d73ce35f361d3a2e365f8eb88f5fc5b07d653bf20ff1b5c34202

    • SHA512

      3e283bc98fa71091c721276971d2928916a443a9f3a9a83e6925e267b37239a07482095f29192bea392e5d478904ce5e449a03cd00c6c99ce52d667531a6fa7d

    • SSDEEP

      3072:vOjjuAt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPp:vzu9OKofHfHTXQLzgvnzHPowYbvrjD/s

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks