General

  • Target

    99dbe15571a13b8ff9a6acda1e409267a93c354cf1c43a97d5bce4f49c4b5863

  • Size

    159KB

  • Sample

    241110-f3wlwazhmn

  • MD5

    25d0403adf6eea47ffe09a1282dc8059

  • SHA1

    eb1127fc57316a1066d2265bb2ec6f799ea89716

  • SHA256

    99dbe15571a13b8ff9a6acda1e409267a93c354cf1c43a97d5bce4f49c4b5863

  • SHA512

    63cb0c3616a85d0b896c8f9b8d9daf38dda5ad1092d5bd0e34e4d6c82b89e0c983b2cfa07d373d6bb5a3090dfd34e2efea979c6ccab61d90240e0e40d1fa0eda

  • SSDEEP

    3072:oZpYg19EeiLLmjempGuCYooEK1JWaCItULG3rt2Wcora4dI:OPjEl6jLiQ1JW+Oy3p/

Malware Config

Targets

    • Target

      99dbe15571a13b8ff9a6acda1e409267a93c354cf1c43a97d5bce4f49c4b5863

    • Size

      159KB

    • MD5

      25d0403adf6eea47ffe09a1282dc8059

    • SHA1

      eb1127fc57316a1066d2265bb2ec6f799ea89716

    • SHA256

      99dbe15571a13b8ff9a6acda1e409267a93c354cf1c43a97d5bce4f49c4b5863

    • SHA512

      63cb0c3616a85d0b896c8f9b8d9daf38dda5ad1092d5bd0e34e4d6c82b89e0c983b2cfa07d373d6bb5a3090dfd34e2efea979c6ccab61d90240e0e40d1fa0eda

    • SSDEEP

      3072:oZpYg19EeiLLmjempGuCYooEK1JWaCItULG3rt2Wcora4dI:OPjEl6jLiQ1JW+Oy3p/

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks