General

  • Target

    e6b382d961dc7285df87fceec6cc0102cfa9b3054feb3cdb6a429e287f82ce57

  • Size

    226KB

  • Sample

    241121-mpy86s1nfs

  • MD5

    8035b51ddb49d7424c925f591d4dded2

  • SHA1

    5f311d441e47a535a4e09538a585cffbf340edf9

  • SHA256

    e6b382d961dc7285df87fceec6cc0102cfa9b3054feb3cdb6a429e287f82ce57

  • SHA512

    89a141d51d2e455eb9a9d1c6838ad85bc45973fd5e9dee10eb31c9e0acecc18188c0789612a7803d2408c9d8dddf84b3d8046f4ef3ba56a182c1e075232ae3e3

  • SSDEEP

    6144:WIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCtZ0:rKofHfHTXQLzgvnzHPowYbvrjD/L7QPS

Malware Config

Targets

    • Target

      e6b382d961dc7285df87fceec6cc0102cfa9b3054feb3cdb6a429e287f82ce57

    • Size

      226KB

    • MD5

      8035b51ddb49d7424c925f591d4dded2

    • SHA1

      5f311d441e47a535a4e09538a585cffbf340edf9

    • SHA256

      e6b382d961dc7285df87fceec6cc0102cfa9b3054feb3cdb6a429e287f82ce57

    • SHA512

      89a141d51d2e455eb9a9d1c6838ad85bc45973fd5e9dee10eb31c9e0acecc18188c0789612a7803d2408c9d8dddf84b3d8046f4ef3ba56a182c1e075232ae3e3

    • SSDEEP

      6144:WIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCtZ0:rKofHfHTXQLzgvnzHPowYbvrjD/L7QPS

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks