General

  • Target

    ea86c7c1023051be091a6401ba80d5501cfd9afdd7ae6a01d097463a38433b5f

  • Size

    155KB

  • Sample

    240522-xzvzlsdd83

  • MD5

    2ee00b4e44705a9bf06304f5a7311289

  • SHA1

    9032d061c019ab69e18763eb31a9c620179a3b3f

  • SHA256

    ea86c7c1023051be091a6401ba80d5501cfd9afdd7ae6a01d097463a38433b5f

  • SHA512

    64f0025a7cc98c280099568a4a7fa6d4dbc577998f7c0c1be6a21efaa4b2c6c9de4987e2bd40e32820341816aab1ff55dc635957d7283149ec7c85c5714ee368

  • SSDEEP

    3072:oZpYg19EeiLLmjempGuCYooEK1JWaCItULG3rt2Wcora4dI:OPjEl6jLiQ1JW+Oy3p/

Malware Config

Targets

    • Target

      ea86c7c1023051be091a6401ba80d5501cfd9afdd7ae6a01d097463a38433b5f

    • Size

      155KB

    • MD5

      2ee00b4e44705a9bf06304f5a7311289

    • SHA1

      9032d061c019ab69e18763eb31a9c620179a3b3f

    • SHA256

      ea86c7c1023051be091a6401ba80d5501cfd9afdd7ae6a01d097463a38433b5f

    • SHA512

      64f0025a7cc98c280099568a4a7fa6d4dbc577998f7c0c1be6a21efaa4b2c6c9de4987e2bd40e32820341816aab1ff55dc635957d7283149ec7c85c5714ee368

    • SSDEEP

      3072:oZpYg19EeiLLmjempGuCYooEK1JWaCItULG3rt2Wcora4dI:OPjEl6jLiQ1JW+Oy3p/

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks