General

  • Target

    aebb93f091048c945ce3fbfc0c71e5e52c2732ffceb193e4c86a0bb91b499c82N

  • Size

    2.4MB

  • Sample

    240919-gy4blavdkp

  • MD5

    160a102561c4e6e216f190f17f5a1ae0

  • SHA1

    6e8cc6300c090aa20bc38047f8ce4d2f1703b031

  • SHA256

    aebb93f091048c945ce3fbfc0c71e5e52c2732ffceb193e4c86a0bb91b499c82

  • SHA512

    fbf5beb0a8b2ad24afb26cc1fa00af69f4fbdeb95fc96d9706b4efa21a030c80e7ce5e9d7508a731ad6ce869f6fd9f0924cf3ae74397098e3c919b2371f24e1f

  • SSDEEP

    49152:2R/laMbYAp7s5nceEv7MuGOe4jPyTmE7ZIIKR01GSM8prnoo:2RNvpAceMjGL4jaCE7ZGCxh

Malware Config

Targets

    • Target

      aebb93f091048c945ce3fbfc0c71e5e52c2732ffceb193e4c86a0bb91b499c82N

    • Size

      2.4MB

    • MD5

      160a102561c4e6e216f190f17f5a1ae0

    • SHA1

      6e8cc6300c090aa20bc38047f8ce4d2f1703b031

    • SHA256

      aebb93f091048c945ce3fbfc0c71e5e52c2732ffceb193e4c86a0bb91b499c82

    • SHA512

      fbf5beb0a8b2ad24afb26cc1fa00af69f4fbdeb95fc96d9706b4efa21a030c80e7ce5e9d7508a731ad6ce869f6fd9f0924cf3ae74397098e3c919b2371f24e1f

    • SSDEEP

      49152:2R/laMbYAp7s5nceEv7MuGOe4jPyTmE7ZIIKR01GSM8prnoo:2RNvpAceMjGL4jaCE7ZGCxh

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks