General

  • Target

    86ef06adfe3da188c08e38e0517e24ef312bff778fbeaadd7891252e3cb1f290

  • Size

    352KB

  • Sample

    240805-3qaj7ssdnp

  • MD5

    27c4d34472a33e8f900b836a6f57b4b6

  • SHA1

    432fedeb47a06845731417022e32cd73c4550c5a

  • SHA256

    86ef06adfe3da188c08e38e0517e24ef312bff778fbeaadd7891252e3cb1f290

  • SHA512

    c0c9a74d2739d7fedf91022aa7e18b759a5d0605dab3ca6760986607c85334a3e735811ea5d19af6955354f882f1ec7c264bd796c468f7718622549cbbc4ba54

  • SSDEEP

    6144:hIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCe8i:YKofHfHTXQLzgvnzHPowYbvrjD/L7QPs

Malware Config

Targets

    • Target

      86ef06adfe3da188c08e38e0517e24ef312bff778fbeaadd7891252e3cb1f290

    • Size

      352KB

    • MD5

      27c4d34472a33e8f900b836a6f57b4b6

    • SHA1

      432fedeb47a06845731417022e32cd73c4550c5a

    • SHA256

      86ef06adfe3da188c08e38e0517e24ef312bff778fbeaadd7891252e3cb1f290

    • SHA512

      c0c9a74d2739d7fedf91022aa7e18b759a5d0605dab3ca6760986607c85334a3e735811ea5d19af6955354f882f1ec7c264bd796c468f7718622549cbbc4ba54

    • SSDEEP

      6144:hIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCe8i:YKofHfHTXQLzgvnzHPowYbvrjD/L7QPs

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks