General

  • Target

    aa6cc1275372f1310f9e3e5efb1e3cf644c465974f670ca160c78f5f1180dca3

  • Size

    158KB

  • Sample

    241110-f2c35s1bmb

  • MD5

    21457b41859dafd65a8196f7dc32551f

  • SHA1

    391ad8b6e74e8a531e7d921c44aeb974b85d0a4c

  • SHA256

    aa6cc1275372f1310f9e3e5efb1e3cf644c465974f670ca160c78f5f1180dca3

  • SHA512

    d46b33428dc344f453fa203b7d33a6d0d10e2307666fa1c21de874a974c6daee16d983194212109779b3459f012608c5006875ac42605d6b26a3aa7452f5dd0b

  • SSDEEP

    3072:oZpYg19EeiLLmjempGuCYooEK1JWaCItULG3rt2Wcora4dI:OPjEl6jLiQ1JW+Oy3p/

Malware Config

Targets

    • Target

      aa6cc1275372f1310f9e3e5efb1e3cf644c465974f670ca160c78f5f1180dca3

    • Size

      158KB

    • MD5

      21457b41859dafd65a8196f7dc32551f

    • SHA1

      391ad8b6e74e8a531e7d921c44aeb974b85d0a4c

    • SHA256

      aa6cc1275372f1310f9e3e5efb1e3cf644c465974f670ca160c78f5f1180dca3

    • SHA512

      d46b33428dc344f453fa203b7d33a6d0d10e2307666fa1c21de874a974c6daee16d983194212109779b3459f012608c5006875ac42605d6b26a3aa7452f5dd0b

    • SSDEEP

      3072:oZpYg19EeiLLmjempGuCYooEK1JWaCItULG3rt2Wcora4dI:OPjEl6jLiQ1JW+Oy3p/

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks