General

  • Target

    0ab4d40cceb5ca62d98cb578221528d28ea3c4b8b271c8abeac18e04aef73966

  • Size

    226KB

  • Sample

    240722-w6y46s1hkp

  • MD5

    48d82d0ded28a1c559b12ab28b4bb336

  • SHA1

    8cdc0900b0f47a7d1ef017e6e6f72d6dc570eef4

  • SHA256

    0ab4d40cceb5ca62d98cb578221528d28ea3c4b8b271c8abeac18e04aef73966

  • SHA512

    41578e39930711ebd9ce9bd8ebc25b8005ebe6f02c35905b8c198c8d8abe4701355f4455b854583f1d85041524f93c753451a9b1ec67073ae6cc5536731b9b5c

  • SSDEEP

    6144:uIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCtZ0:zKofHfHTXQLzgvnzHPowYbvrjD/L7QPS

Malware Config

Targets

    • Target

      0ab4d40cceb5ca62d98cb578221528d28ea3c4b8b271c8abeac18e04aef73966

    • Size

      226KB

    • MD5

      48d82d0ded28a1c559b12ab28b4bb336

    • SHA1

      8cdc0900b0f47a7d1ef017e6e6f72d6dc570eef4

    • SHA256

      0ab4d40cceb5ca62d98cb578221528d28ea3c4b8b271c8abeac18e04aef73966

    • SHA512

      41578e39930711ebd9ce9bd8ebc25b8005ebe6f02c35905b8c198c8d8abe4701355f4455b854583f1d85041524f93c753451a9b1ec67073ae6cc5536731b9b5c

    • SSDEEP

      6144:uIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCtZ0:zKofHfHTXQLzgvnzHPowYbvrjD/L7QPS

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks