General

  • Target

    f98b28ad1459c0c9705dd1e25def23b9f6b809c904322d329d6d8229f9441874

  • Size

    151KB

  • Sample

    240510-dte7esba65

  • MD5

    4dc73ca634b43e48633c9aefdc26a0d5

  • SHA1

    7295ee045f1a03cb48328aad13aa88e043e205a1

  • SHA256

    f98b28ad1459c0c9705dd1e25def23b9f6b809c904322d329d6d8229f9441874

  • SHA512

    a37dededfb6959683070fb2868801868c06cc3dd869cb0db2bd774d827e28bb258fca87228e695c61192eb7c6e45a461fdd0b4cba718d01cb14b24245a2678fd

  • SSDEEP

    3072:oZpYg19EeiLLmjempGuCYooEK1JWaCItULG3rt2Wcora4dI:OPjEl6jLiQ1JW+Oy3p/

Malware Config

Targets

    • Target

      f98b28ad1459c0c9705dd1e25def23b9f6b809c904322d329d6d8229f9441874

    • Size

      151KB

    • MD5

      4dc73ca634b43e48633c9aefdc26a0d5

    • SHA1

      7295ee045f1a03cb48328aad13aa88e043e205a1

    • SHA256

      f98b28ad1459c0c9705dd1e25def23b9f6b809c904322d329d6d8229f9441874

    • SHA512

      a37dededfb6959683070fb2868801868c06cc3dd869cb0db2bd774d827e28bb258fca87228e695c61192eb7c6e45a461fdd0b4cba718d01cb14b24245a2678fd

    • SSDEEP

      3072:oZpYg19EeiLLmjempGuCYooEK1JWaCItULG3rt2Wcora4dI:OPjEl6jLiQ1JW+Oy3p/

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks