General

  • Target

    7bb5e18987430e2b8b3eb4a9d4050832575565aeb1f88456e77a3684619d6f46

  • Size

    119KB

  • Sample

    240522-b1e4wsgb83

  • MD5

    f0acff40b3db126905e65d2c22178272

  • SHA1

    5659eb5f23352d4c052483ba04cecbdd897194d1

  • SHA256

    7bb5e18987430e2b8b3eb4a9d4050832575565aeb1f88456e77a3684619d6f46

  • SHA512

    4d6b2b266c007a4ccac749dccc32446a124cf06faf68ab5eeca92fa3529ba88c7d379c40fb14d22a33f7da28b5b572228da3ce8ebf7f6bde7d67f9a768ba1fcb

  • SSDEEP

    3072:lOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:lIs9OKofHfHTXQLzgvnzHPowYbvrjD/E

Malware Config

Targets

    • Target

      7bb5e18987430e2b8b3eb4a9d4050832575565aeb1f88456e77a3684619d6f46

    • Size

      119KB

    • MD5

      f0acff40b3db126905e65d2c22178272

    • SHA1

      5659eb5f23352d4c052483ba04cecbdd897194d1

    • SHA256

      7bb5e18987430e2b8b3eb4a9d4050832575565aeb1f88456e77a3684619d6f46

    • SHA512

      4d6b2b266c007a4ccac749dccc32446a124cf06faf68ab5eeca92fa3529ba88c7d379c40fb14d22a33f7da28b5b572228da3ce8ebf7f6bde7d67f9a768ba1fcb

    • SSDEEP

      3072:lOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:lIs9OKofHfHTXQLzgvnzHPowYbvrjD/E

    • UPX dump on OEP (original entry point)

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks