General

  • Target

    d08c7d868b6f93df6263542b58afb2af56c51d223e7b293512585bdfc4717847

  • Size

    41KB

  • Sample

    240421-dn1aeahg3w

  • MD5

    3ec9ad75005d7d0ba35f15c1cba18b94

  • SHA1

    5b116311fd73c4a84137fb3d40d78fb27add7f09

  • SHA256

    d08c7d868b6f93df6263542b58afb2af56c51d223e7b293512585bdfc4717847

  • SHA512

    02eb6f5b64657bed07f4b9c7c3aa6bc6f7aa17358552b517f0d6348b6f41e089a4a252145b7f22be1722e88dc9f88d2d015135f2b40a47fbdd1e9de1e5f13726

  • SSDEEP

    768:8eMc5VwWt1jDkbXdnTOyQxHFO+IxX2P5LIbbcPYir2lAqcdF0i09syp:8q5VwWDjDkdTRqHFOn8tIbbeYiuZIFSL

Malware Config

Targets

    • Target

      d08c7d868b6f93df6263542b58afb2af56c51d223e7b293512585bdfc4717847

    • Size

      41KB

    • MD5

      3ec9ad75005d7d0ba35f15c1cba18b94

    • SHA1

      5b116311fd73c4a84137fb3d40d78fb27add7f09

    • SHA256

      d08c7d868b6f93df6263542b58afb2af56c51d223e7b293512585bdfc4717847

    • SHA512

      02eb6f5b64657bed07f4b9c7c3aa6bc6f7aa17358552b517f0d6348b6f41e089a4a252145b7f22be1722e88dc9f88d2d015135f2b40a47fbdd1e9de1e5f13726

    • SSDEEP

      768:8eMc5VwWt1jDkbXdnTOyQxHFO+IxX2P5LIbbcPYir2lAqcdF0i09syp:8q5VwWDjDkdTRqHFOn8tIbbeYiuZIFSL

    • UPX dump on OEP (original entry point)

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks