General

  • Target

    619b9fba2c8388854993e4daf83dec16a76449759751ead02310c9e300d8bd08

  • Size

    2.3MB

  • Sample

    240908-2fqyrs1dpe

  • MD5

    355697f4ebd7fad555f7839cc8e1cce0

  • SHA1

    4676dc43a39b4f817fc21dbaa9d95997bd11d102

  • SHA256

    619b9fba2c8388854993e4daf83dec16a76449759751ead02310c9e300d8bd08

  • SHA512

    fa70d4c24e9c51c25016b292cfdc1a38c80dcb524313d1e8ccc891c088f311d48c2f54be5424595b726c79730e6d228389d8d5f874c0ab8c0c3d575752029ee9

  • SSDEEP

    49152:fjvk2d9rJpNJ6jUFdXaDoIHmXMupzh72lxakn2YpHdy4ZBgIoooNe:frkI9rSjA5aDo73pzF2bz3p9y4HgIoov

Malware Config

Targets

    • Target

      619b9fba2c8388854993e4daf83dec16a76449759751ead02310c9e300d8bd08

    • Size

      2.3MB

    • MD5

      355697f4ebd7fad555f7839cc8e1cce0

    • SHA1

      4676dc43a39b4f817fc21dbaa9d95997bd11d102

    • SHA256

      619b9fba2c8388854993e4daf83dec16a76449759751ead02310c9e300d8bd08

    • SHA512

      fa70d4c24e9c51c25016b292cfdc1a38c80dcb524313d1e8ccc891c088f311d48c2f54be5424595b726c79730e6d228389d8d5f874c0ab8c0c3d575752029ee9

    • SSDEEP

      49152:fjvk2d9rJpNJ6jUFdXaDoIHmXMupzh72lxakn2YpHdy4ZBgIoooNe:frkI9rSjA5aDo73pzF2bz3p9y4HgIoov

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks