General

  • Target

    Abdal FTP BruteForce 1.0.exe

  • Size

    142.0MB

  • Sample

    240808-2ez52s1dqk

  • MD5

    b10bbefa03b5fd41ca93e729d10fe865

  • SHA1

    2e3916e4fd64097f5a56207401aace3dfb57492f

  • SHA256

    338b3026d18a25a1acebd822892226b41586cc9dfaaa1311e41006676e33cbdb

  • SHA512

    51c97bb0867ab291666cd3b859fa57e21c1821da20b393fdc81aee5fe80e6f1b008fabda413880a4fd4d724fef9ea37290641384edf23260c152f6a3f5491d7b

  • SSDEEP

    3145728:PwyrS6jEpcXAo8UXvOuiMPNGsLE7Ji4SMl5:PwyrfjXQHUX2MP4Xb

Malware Config

Targets

    • Target

      Abdal FTP BruteForce 1.0.exe

    • Size

      142.0MB

    • MD5

      b10bbefa03b5fd41ca93e729d10fe865

    • SHA1

      2e3916e4fd64097f5a56207401aace3dfb57492f

    • SHA256

      338b3026d18a25a1acebd822892226b41586cc9dfaaa1311e41006676e33cbdb

    • SHA512

      51c97bb0867ab291666cd3b859fa57e21c1821da20b393fdc81aee5fe80e6f1b008fabda413880a4fd4d724fef9ea37290641384edf23260c152f6a3f5491d7b

    • SSDEEP

      3145728:PwyrS6jEpcXAo8UXvOuiMPNGsLE7Ji4SMl5:PwyrfjXQHUX2MP4Xb

    • Detected Ploutus loader

    • Ploutus

      Ploutus is an ATM malware written in C#.

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

System Time Discovery

1
T1124

Tasks