General

  • Target

    128fd6baa1fea35c213da458b86163d2fc05cb830d6a556f67818d7107365d79

  • Size

    118KB

  • Sample

    240512-xrebwsbf4y

  • MD5

    2e7f0fa831b8bbf20c1c28f54d4551ee

  • SHA1

    fe1200231a90a92fda9792943a3dd8e1d3202896

  • SHA256

    128fd6baa1fea35c213da458b86163d2fc05cb830d6a556f67818d7107365d79

  • SHA512

    2944806ea7f40deb7c49184a7e95f8a10029e7756aa2d573c8f4cea64a89666389fb308544f1a07d9bdeb631e515539b8e2e207db7c481610b0db3d086508f04

  • SSDEEP

    3072:9OjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPo:9Is9OKofHfHTXQLzgvnzHPowYbvrjD/h

Malware Config

Targets

    • Target

      128fd6baa1fea35c213da458b86163d2fc05cb830d6a556f67818d7107365d79

    • Size

      118KB

    • MD5

      2e7f0fa831b8bbf20c1c28f54d4551ee

    • SHA1

      fe1200231a90a92fda9792943a3dd8e1d3202896

    • SHA256

      128fd6baa1fea35c213da458b86163d2fc05cb830d6a556f67818d7107365d79

    • SHA512

      2944806ea7f40deb7c49184a7e95f8a10029e7756aa2d573c8f4cea64a89666389fb308544f1a07d9bdeb631e515539b8e2e207db7c481610b0db3d086508f04

    • SSDEEP

      3072:9OjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPo:9Is9OKofHfHTXQLzgvnzHPowYbvrjD/h

    • UPX dump on OEP (original entry point)

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks