General

  • Target

    9f6655077a1757251317493f472eff90N.exe

  • Size

    117KB

  • Sample

    240722-mqfs8aterr

  • MD5

    9f6655077a1757251317493f472eff90

  • SHA1

    4e33de0388d6f21dce554b92c0ba697c01f45bad

  • SHA256

    0d7089ccb61ac60d1923f2a511bb506f5436482c5245b3a281a93a850363bbdf

  • SHA512

    a5235bd28543ec3efa83955980601be13c1796e8d979917da1d5167a362bb7ff6e8e45dbea01658cf47de4aec07e065869e62e9aca51b2508472d296bc24467e

  • SSDEEP

    3072:EagwS1Ut+KNPJI1F3Md55keTZwcM2I38QXy:vUGPJKF3Md55ZTZwz38QX

Malware Config

Targets

    • Target

      9f6655077a1757251317493f472eff90N.exe

    • Size

      117KB

    • MD5

      9f6655077a1757251317493f472eff90

    • SHA1

      4e33de0388d6f21dce554b92c0ba697c01f45bad

    • SHA256

      0d7089ccb61ac60d1923f2a511bb506f5436482c5245b3a281a93a850363bbdf

    • SHA512

      a5235bd28543ec3efa83955980601be13c1796e8d979917da1d5167a362bb7ff6e8e45dbea01658cf47de4aec07e065869e62e9aca51b2508472d296bc24467e

    • SSDEEP

      3072:EagwS1Ut+KNPJI1F3Md55keTZwcM2I38QXy:vUGPJKF3Md55ZTZwz38QX

    • Blocklisted process makes network request

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks