General

  • Target

    3014af1530f835ae748ca0ee65c4f155d02d61a8b2fdc24088b0a1c7320d7a70

  • Size

    2.4MB

  • Sample

    240824-zqwkws1arm

  • MD5

    34e4c0ebfed6615737ccd161ffe256b9

  • SHA1

    f7fa94b9735c6d53f67b4081aa620f522f0c3cbe

  • SHA256

    3014af1530f835ae748ca0ee65c4f155d02d61a8b2fdc24088b0a1c7320d7a70

  • SHA512

    21876710043bf725eab3c869e0c1ab3b4015de25722e6320a9f3512b544b33021358eb06eb9fbdcd60b99142ab063749df6d5f2070d6787c53e27efebc20b82d

  • SSDEEP

    49152:PR/laMbYAp7s5nceEv7MuGOe4jPyTmE7ZIIKR01GSM8prnoo:PRNvpAceMjGL4jaCE7ZGCxh

Malware Config

Targets

    • Target

      3014af1530f835ae748ca0ee65c4f155d02d61a8b2fdc24088b0a1c7320d7a70

    • Size

      2.4MB

    • MD5

      34e4c0ebfed6615737ccd161ffe256b9

    • SHA1

      f7fa94b9735c6d53f67b4081aa620f522f0c3cbe

    • SHA256

      3014af1530f835ae748ca0ee65c4f155d02d61a8b2fdc24088b0a1c7320d7a70

    • SHA512

      21876710043bf725eab3c869e0c1ab3b4015de25722e6320a9f3512b544b33021358eb06eb9fbdcd60b99142ab063749df6d5f2070d6787c53e27efebc20b82d

    • SSDEEP

      49152:PR/laMbYAp7s5nceEv7MuGOe4jPyTmE7ZIIKR01GSM8prnoo:PRNvpAceMjGL4jaCE7ZGCxh

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks