General

  • Target

    System32.exe

  • Size

    17.4MB

  • Sample

    240511-mfdwwace3z

  • MD5

    ce90da8597df4c20d3f327631aa08815

  • SHA1

    a847abbd806100ca95c7e027003357bfe9d7e437

  • SHA256

    a4c4d8011e557216f44716fadcbc8cb01ce76ae02f559cca910a286c50cdf6da

  • SHA512

    18cd5caa9cc8797f2ea94684a1454c3e571258a92ef85b111083cb41cad5ae7dbf7541507c264c4cf2d3d989e38112651b32b27ec9cb99b7b0acfbaffd83aacd

  • SSDEEP

    393216:VXMJ06k3+bPmYRQK7+RjEP++ydrWy/lGgpGLA7omM8umWrRH5uYQe8ayP:VXI0vObrRQoP++UplGmjomM8uFri8D

Malware Config

Targets

    • Target

      System32.exe

    • Size

      17.4MB

    • MD5

      ce90da8597df4c20d3f327631aa08815

    • SHA1

      a847abbd806100ca95c7e027003357bfe9d7e437

    • SHA256

      a4c4d8011e557216f44716fadcbc8cb01ce76ae02f559cca910a286c50cdf6da

    • SHA512

      18cd5caa9cc8797f2ea94684a1454c3e571258a92ef85b111083cb41cad5ae7dbf7541507c264c4cf2d3d989e38112651b32b27ec9cb99b7b0acfbaffd83aacd

    • SSDEEP

      393216:VXMJ06k3+bPmYRQK7+RjEP++ydrWy/lGgpGLA7omM8umWrRH5uYQe8ayP:VXI0vObrRQoP++UplGmjomM8uFri8D

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks