General

  • Target

    bedfeb4444c5deca0ac31d9844f53b79f0894e8277406add8a5da24d04de8a94

  • Size

    195KB

  • Sample

    240706-cscjgashlk

  • MD5

    28adad392a7893b3353722630c9d3d6d

  • SHA1

    685951f18dc6ac11fa98474585d1cef32d535602

  • SHA256

    bedfeb4444c5deca0ac31d9844f53b79f0894e8277406add8a5da24d04de8a94

  • SHA512

    48ea8b190dd57100f8282001f2f821093a346c2b354c2fd9144189ed7f3f13af8843b1b4a8cb61c7ea8237af3556a75a39c3eabaf4a58df81d774dd5a34c07cf

  • SSDEEP

    6144:/Is9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCyOW:KKofHfHTXQLzgvnzHPowYbvrjD/L7QPo

Malware Config

Targets

    • Target

      bedfeb4444c5deca0ac31d9844f53b79f0894e8277406add8a5da24d04de8a94

    • Size

      195KB

    • MD5

      28adad392a7893b3353722630c9d3d6d

    • SHA1

      685951f18dc6ac11fa98474585d1cef32d535602

    • SHA256

      bedfeb4444c5deca0ac31d9844f53b79f0894e8277406add8a5da24d04de8a94

    • SHA512

      48ea8b190dd57100f8282001f2f821093a346c2b354c2fd9144189ed7f3f13af8843b1b4a8cb61c7ea8237af3556a75a39c3eabaf4a58df81d774dd5a34c07cf

    • SSDEEP

      6144:/Is9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCyOW:KKofHfHTXQLzgvnzHPowYbvrjD/L7QPo

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks