General

  • Target

    160d2b1d2ce33182cb13191cca0b98d71c403681047eb318a8e0c36483ee95a9

  • Size

    173KB

  • Sample

    240902-xmlv6swfme

  • MD5

    5fd816d9d884fea888390ff0c85ff029

  • SHA1

    c6fb6c36691c7e79543707d1c16731677f11ecdd

  • SHA256

    160d2b1d2ce33182cb13191cca0b98d71c403681047eb318a8e0c36483ee95a9

  • SHA512

    d3c2d2a6686e8b215152b2307315790b1b29a7f89ebac20210f6981f3c34681a62c579b443f2cf457985ed01f045f0ba35e711baa92f2abc0405b05f3f2073b6

  • SSDEEP

    3072:YOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPq:YIs9OKofHfHTXQLzgvnzHPowYbvrjD/5

Malware Config

Targets

    • Target

      160d2b1d2ce33182cb13191cca0b98d71c403681047eb318a8e0c36483ee95a9

    • Size

      173KB

    • MD5

      5fd816d9d884fea888390ff0c85ff029

    • SHA1

      c6fb6c36691c7e79543707d1c16731677f11ecdd

    • SHA256

      160d2b1d2ce33182cb13191cca0b98d71c403681047eb318a8e0c36483ee95a9

    • SHA512

      d3c2d2a6686e8b215152b2307315790b1b29a7f89ebac20210f6981f3c34681a62c579b443f2cf457985ed01f045f0ba35e711baa92f2abc0405b05f3f2073b6

    • SSDEEP

      3072:YOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPq:YIs9OKofHfHTXQLzgvnzHPowYbvrjD/5

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks