General

  • Target

    ab31ada6cd99c0e0627a1157b014ab5a20a3cb344d8bc9e12f0370f5f19a4dbb

  • Size

    418KB

  • Sample

    240325-zdt7asbh5y

  • MD5

    a2a9375f4b7b9ea0b13a5b86740f46db

  • SHA1

    b52fcaf2077282c086ba728d3418bd877d622d65

  • SHA256

    ab31ada6cd99c0e0627a1157b014ab5a20a3cb344d8bc9e12f0370f5f19a4dbb

  • SHA512

    ed72100c1cf3fd6b6f1af2afe81107e6b15cfc3f743b0f25e68bc24f9d55b57456599fe40a598d75c9ad92f07f26f09c0c66ab33d9f04ae3eebc7d97b908e1af

  • SSDEEP

    12288:3MRO60dUfOnMmXeGJpzX07dokIK16besKBjvrEH7d1:cIvlnvXeGnEhK6rEH7d1

Malware Config

Targets

    • Target

      ab31ada6cd99c0e0627a1157b014ab5a20a3cb344d8bc9e12f0370f5f19a4dbb

    • Size

      418KB

    • MD5

      a2a9375f4b7b9ea0b13a5b86740f46db

    • SHA1

      b52fcaf2077282c086ba728d3418bd877d622d65

    • SHA256

      ab31ada6cd99c0e0627a1157b014ab5a20a3cb344d8bc9e12f0370f5f19a4dbb

    • SHA512

      ed72100c1cf3fd6b6f1af2afe81107e6b15cfc3f743b0f25e68bc24f9d55b57456599fe40a598d75c9ad92f07f26f09c0c66ab33d9f04ae3eebc7d97b908e1af

    • SSDEEP

      12288:3MRO60dUfOnMmXeGJpzX07dokIK16besKBjvrEH7d1:cIvlnvXeGnEhK6rEH7d1

    • UPX dump on OEP (original entry point)

    • Downloads MZ/PE file

    • Modifies AppInit DLL entries

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks