General

  • Target

    7b77cd7613997bbd1e4096dcb3dde97e10a7abd011b6b45ea05d45b0584af4e9

  • Size

    158KB

  • Sample

    241110-hkg2wasbmc

  • MD5

    6c90a74ca51fecf925780e20c7214111

  • SHA1

    fc1bfaa012436eda9cc99dffa403dda1221e00ba

  • SHA256

    7b77cd7613997bbd1e4096dcb3dde97e10a7abd011b6b45ea05d45b0584af4e9

  • SHA512

    15c38c73c8ad0f802bd1451d141c424570b805a703b7484f6415ba2413e432234eec040aefac3e8e5ff25215059e83d719a99b7acf7f1d7968fc54c4f4356772

  • SSDEEP

    3072:oZpYg19EeiLLmjempGuCYooEK1JWaCItULG3rt2Wcora4dI:OPjEl6jLiQ1JW+Oy3p/

Malware Config

Targets

    • Target

      7b77cd7613997bbd1e4096dcb3dde97e10a7abd011b6b45ea05d45b0584af4e9

    • Size

      158KB

    • MD5

      6c90a74ca51fecf925780e20c7214111

    • SHA1

      fc1bfaa012436eda9cc99dffa403dda1221e00ba

    • SHA256

      7b77cd7613997bbd1e4096dcb3dde97e10a7abd011b6b45ea05d45b0584af4e9

    • SHA512

      15c38c73c8ad0f802bd1451d141c424570b805a703b7484f6415ba2413e432234eec040aefac3e8e5ff25215059e83d719a99b7acf7f1d7968fc54c4f4356772

    • SSDEEP

      3072:oZpYg19EeiLLmjempGuCYooEK1JWaCItULG3rt2Wcora4dI:OPjEl6jLiQ1JW+Oy3p/

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks