General

  • Target

    1db4b21b78143a432611aaa12f1cd0828d6e916f8b2f5c14a3aef049177f816c

  • Size

    158KB

  • Sample

    241101-hw2weszmcn

  • MD5

    a9f31f8d926758d2f4dc950ecbbd86bd

  • SHA1

    1a647359d77beb344301fe4df0e7ce08091d4fcd

  • SHA256

    1db4b21b78143a432611aaa12f1cd0828d6e916f8b2f5c14a3aef049177f816c

  • SHA512

    2dc2187deb1ca493b5fba23c8c41d47714874c6fef75641f827840800f289396a70aeeb5584366fc94a776205489f86cebd57e3eea8096978f949e2ecd77e2b6

  • SSDEEP

    3072:oZpYg19EeiLLmjempGuCYooEK1JWaCItULG3rt2Wcora4dIM:OPjEl6jLiQ1JW+Oy3p/F

Malware Config

Targets

    • Target

      1db4b21b78143a432611aaa12f1cd0828d6e916f8b2f5c14a3aef049177f816c

    • Size

      158KB

    • MD5

      a9f31f8d926758d2f4dc950ecbbd86bd

    • SHA1

      1a647359d77beb344301fe4df0e7ce08091d4fcd

    • SHA256

      1db4b21b78143a432611aaa12f1cd0828d6e916f8b2f5c14a3aef049177f816c

    • SHA512

      2dc2187deb1ca493b5fba23c8c41d47714874c6fef75641f827840800f289396a70aeeb5584366fc94a776205489f86cebd57e3eea8096978f949e2ecd77e2b6

    • SSDEEP

      3072:oZpYg19EeiLLmjempGuCYooEK1JWaCItULG3rt2Wcora4dIM:OPjEl6jLiQ1JW+Oy3p/F

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks