General

  • Target

    b6a52b2f810416cc43aa934380b44a70N.exe

  • Size

    2.4MB

  • Sample

    240906-wyp7as1drn

  • MD5

    b6a52b2f810416cc43aa934380b44a70

  • SHA1

    f41e85d3a096658ad8df68a630f1d1a33216e567

  • SHA256

    a8f28e0c0f0d45d72d1b708e44836be785d2544c25cc7fce99a2995bd412c859

  • SHA512

    8d38c59584c5f05af58fc7a5f8440e67ff89c0444daf2faab13c74f5bbfe5a3ee4d78d73659329da62c1e648439753190b3b824bda2226235a17b7a8ab12c1bc

  • SSDEEP

    49152:VR/laMbYAp7s5nceEv7MuGOe4jPyTmE7ZIIKR01GSM8prnoo:VRNvpAceMjGL4jaCE7ZGCxh

Malware Config

Targets

    • Target

      b6a52b2f810416cc43aa934380b44a70N.exe

    • Size

      2.4MB

    • MD5

      b6a52b2f810416cc43aa934380b44a70

    • SHA1

      f41e85d3a096658ad8df68a630f1d1a33216e567

    • SHA256

      a8f28e0c0f0d45d72d1b708e44836be785d2544c25cc7fce99a2995bd412c859

    • SHA512

      8d38c59584c5f05af58fc7a5f8440e67ff89c0444daf2faab13c74f5bbfe5a3ee4d78d73659329da62c1e648439753190b3b824bda2226235a17b7a8ab12c1bc

    • SSDEEP

      49152:VR/laMbYAp7s5nceEv7MuGOe4jPyTmE7ZIIKR01GSM8prnoo:VRNvpAceMjGL4jaCE7ZGCxh

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks