General

  • Target

    5118348996d2113431a0fbc788107b6796eb7348a167e7d5059ea0aeba334fa0N

  • Size

    119KB

  • Sample

    240919-e91nqs1eqf

  • MD5

    ca3a5b2d4515c8e32b1d16a74bbe5e30

  • SHA1

    4d00c88d5e6c66e2d8508121188fb2bdc3bb8579

  • SHA256

    5118348996d2113431a0fbc788107b6796eb7348a167e7d5059ea0aeba334fa0

  • SHA512

    10714583c60fa5b554e5067e30366b932eea74ace6fc886d26911d84d0e829cb1ef2cae355966e316e9cfff76945cf0d40279f00665626d04c2bcc16aaf9242c

  • SSDEEP

    3072:EOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:EIs9OKofHfHTXQLzgvnzHPowYbvrjD/E

Malware Config

Targets

    • Target

      5118348996d2113431a0fbc788107b6796eb7348a167e7d5059ea0aeba334fa0N

    • Size

      119KB

    • MD5

      ca3a5b2d4515c8e32b1d16a74bbe5e30

    • SHA1

      4d00c88d5e6c66e2d8508121188fb2bdc3bb8579

    • SHA256

      5118348996d2113431a0fbc788107b6796eb7348a167e7d5059ea0aeba334fa0

    • SHA512

      10714583c60fa5b554e5067e30366b932eea74ace6fc886d26911d84d0e829cb1ef2cae355966e316e9cfff76945cf0d40279f00665626d04c2bcc16aaf9242c

    • SSDEEP

      3072:EOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:EIs9OKofHfHTXQLzgvnzHPowYbvrjD/E

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks