General

  • Target

    9aad70eb9be5a3e93c687a4aa8f5202e7c6b26acafefeb14551e8ebc1b9a4cdb

  • Size

    478KB

  • Sample

    240611-bdvaasxgkg

  • MD5

    57699a73bd063bf9ae0e915a15ec0a48

  • SHA1

    dd3ec3823c5e3579c0a43da8712afd13629323ea

  • SHA256

    9aad70eb9be5a3e93c687a4aa8f5202e7c6b26acafefeb14551e8ebc1b9a4cdb

  • SHA512

    e857b75304b6cd0977f1e5b9ffabbe1f4f8ed11504dcdc0f8e01015af2fe767fd7ec9a464fb4e272641a3880b8bf7af10ef4fa3c2dbd6fb731ad6d82873cd9d4

  • SSDEEP

    6144:WafsiuvAJ+tTm6cyERSEFtj71cWE4jKS6v3BV+UdvrEFp7hK9h:TCvAJ+q6ctRzz36WfjOPBjvrEH7Kh

Malware Config

Targets

    • Target

      9aad70eb9be5a3e93c687a4aa8f5202e7c6b26acafefeb14551e8ebc1b9a4cdb

    • Size

      478KB

    • MD5

      57699a73bd063bf9ae0e915a15ec0a48

    • SHA1

      dd3ec3823c5e3579c0a43da8712afd13629323ea

    • SHA256

      9aad70eb9be5a3e93c687a4aa8f5202e7c6b26acafefeb14551e8ebc1b9a4cdb

    • SHA512

      e857b75304b6cd0977f1e5b9ffabbe1f4f8ed11504dcdc0f8e01015af2fe767fd7ec9a464fb4e272641a3880b8bf7af10ef4fa3c2dbd6fb731ad6d82873cd9d4

    • SSDEEP

      6144:WafsiuvAJ+tTm6cyERSEFtj71cWE4jKS6v3BV+UdvrEFp7hK9h:TCvAJ+q6ctRzz36WfjOPBjvrEH7Kh

    • UPX dump on OEP (original entry point)

    • Modifies AppInit DLL entries

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks