General

  • Target

    1ef6359bccac00b5eaa6cbd8b98d93138706245da928acf387916641ec62c555N.exe

  • Size

    110KB

  • Sample

    241111-x6dnxatlds

  • MD5

    c76934f707118c7af6e09532c514275f

  • SHA1

    177f41f4e4f849b06296f7e8527d2f00da90b9ca

  • SHA256

    e5044395f4432ea349408a6e5f835567d7c38b6e6030ee31633469e02ebb669b

  • SHA512

    a4a38d0341fc7236ff21890f4580f42eb300242e9395b6232604db00afefe0b8005bb6e6ea30346805051af5524a9c819b75b2ed7a728062ffcb0a3f20465153

  • SSDEEP

    3072:IK4RNx6nb4RoIw/XBSeral6oaE0HGnvXuEOrc0pTR:Il6XYeel6GGGVOD

Malware Config

Targets

    • Target

      1ef6359bccac00b5eaa6cbd8b98d93138706245da928acf387916641ec62c555N.exe

    • Size

      110KB

    • MD5

      c76934f707118c7af6e09532c514275f

    • SHA1

      177f41f4e4f849b06296f7e8527d2f00da90b9ca

    • SHA256

      e5044395f4432ea349408a6e5f835567d7c38b6e6030ee31633469e02ebb669b

    • SHA512

      a4a38d0341fc7236ff21890f4580f42eb300242e9395b6232604db00afefe0b8005bb6e6ea30346805051af5524a9c819b75b2ed7a728062ffcb0a3f20465153

    • SSDEEP

      3072:IK4RNx6nb4RoIw/XBSeral6oaE0HGnvXuEOrc0pTR:Il6XYeel6GGGVOD

    • Blocklisted process makes network request

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks