General

  • Target

    ffb516998784d2cf64e720bd6f935f976540f3f6aa5e9b7397db5649281f3a9e

  • Size

    2.3MB

  • Sample

    240919-efqaxazekk

  • MD5

    ddce8ebad599b4f31542a4a926a3ff89

  • SHA1

    ad4ffad7ac19c427c0595bde030f8d043ae819ca

  • SHA256

    ffb516998784d2cf64e720bd6f935f976540f3f6aa5e9b7397db5649281f3a9e

  • SHA512

    405adb2864019607406e8799e5ce6dca14d36c7131a2c9bf40c8ec5c4d460902bdee7b7f60da5939ddc5ae1afbef5b15da43f0a929def312ee2521361fca37dc

  • SSDEEP

    49152:ljvk2d9rJpNJ6jUFdXaDoIHmXMupzh72lxakn2YpHdy4ZBgIoooNe:lrkI9rSjA5aDo73pzF2bz3p9y4HgIoov

Malware Config

Targets

    • Target

      ffb516998784d2cf64e720bd6f935f976540f3f6aa5e9b7397db5649281f3a9e

    • Size

      2.3MB

    • MD5

      ddce8ebad599b4f31542a4a926a3ff89

    • SHA1

      ad4ffad7ac19c427c0595bde030f8d043ae819ca

    • SHA256

      ffb516998784d2cf64e720bd6f935f976540f3f6aa5e9b7397db5649281f3a9e

    • SHA512

      405adb2864019607406e8799e5ce6dca14d36c7131a2c9bf40c8ec5c4d460902bdee7b7f60da5939ddc5ae1afbef5b15da43f0a929def312ee2521361fca37dc

    • SSDEEP

      49152:ljvk2d9rJpNJ6jUFdXaDoIHmXMupzh72lxakn2YpHdy4ZBgIoooNe:lrkI9rSjA5aDo73pzF2bz3p9y4HgIoov

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks