General

  • Target

    31a1a02db32cce63d1a1ab09b89a45ddc78d749b1c44582aab6a37e2e7a0bc76N

  • Size

    226KB

  • Sample

    241015-jle5casfqb

  • MD5

    4cd31cb20f74c489cc49c10dc744f910

  • SHA1

    241593b9cd371f65d6519a88fea7ffc97c9b8630

  • SHA256

    31a1a02db32cce63d1a1ab09b89a45ddc78d749b1c44582aab6a37e2e7a0bc76

  • SHA512

    574c6615ae1913e2ec27da3d9996a45431c089f2617fa0a730b1c3d037fcf1497aee1c405698e21dd73a6b0595a06a410801b745099f4c9b3cacb18c73de3d60

  • SSDEEP

    6144:cIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCtZ0:tKofHfHTXQLzgvnzHPowYbvrjD/L7QPS

Malware Config

Targets

    • Target

      31a1a02db32cce63d1a1ab09b89a45ddc78d749b1c44582aab6a37e2e7a0bc76N

    • Size

      226KB

    • MD5

      4cd31cb20f74c489cc49c10dc744f910

    • SHA1

      241593b9cd371f65d6519a88fea7ffc97c9b8630

    • SHA256

      31a1a02db32cce63d1a1ab09b89a45ddc78d749b1c44582aab6a37e2e7a0bc76

    • SHA512

      574c6615ae1913e2ec27da3d9996a45431c089f2617fa0a730b1c3d037fcf1497aee1c405698e21dd73a6b0595a06a410801b745099f4c9b3cacb18c73de3d60

    • SSDEEP

      6144:cIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCtZ0:tKofHfHTXQLzgvnzHPowYbvrjD/L7QPS

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks