General

  • Target

    8824a0b912b42dc9ebd18c8e85a89680N

  • Size

    118KB

  • Sample

    240913-w291wa1enn

  • MD5

    8824a0b912b42dc9ebd18c8e85a89680

  • SHA1

    e2e2a1f22c2091274eb43975ce71d7c50152080d

  • SHA256

    a46641ab890221831f8a21441d6d96c2b116ee95066c3ae99711c4ce89e54b19

  • SHA512

    8223503f19e96bdc0c91054004bb3a86bb2fa3b56b8d9c9ab3e6c890d3a88d956373753dde760c2003c22e08b1fc5e18f5fbed0d81f3ffa6fa47f87eeb7d3440

  • SSDEEP

    3072:EagwS1Ut+KNPJI1F3Md55keTZwcM2I38QXyT:vUGPJKF3Md55ZTZwz38QXS

Malware Config

Targets

    • Target

      8824a0b912b42dc9ebd18c8e85a89680N

    • Size

      118KB

    • MD5

      8824a0b912b42dc9ebd18c8e85a89680

    • SHA1

      e2e2a1f22c2091274eb43975ce71d7c50152080d

    • SHA256

      a46641ab890221831f8a21441d6d96c2b116ee95066c3ae99711c4ce89e54b19

    • SHA512

      8223503f19e96bdc0c91054004bb3a86bb2fa3b56b8d9c9ab3e6c890d3a88d956373753dde760c2003c22e08b1fc5e18f5fbed0d81f3ffa6fa47f87eeb7d3440

    • SSDEEP

      3072:EagwS1Ut+KNPJI1F3Md55keTZwcM2I38QXyT:vUGPJKF3Md55ZTZwz38QXS

    • Blocklisted process makes network request

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks