General

  • Target

    fd3e1ccf6c0e3b6f64f92103eee7725cbde6d5b026eb1670c245956a4f36fcc7

  • Size

    2.3MB

  • Sample

    241121-qsh8xatajn

  • MD5

    4708a6f3b23d145ee3f206689a9a6351

  • SHA1

    c5b5a3de453c3a1481e8c3bfe3620870748e3e62

  • SHA256

    fd3e1ccf6c0e3b6f64f92103eee7725cbde6d5b026eb1670c245956a4f36fcc7

  • SHA512

    956eac7b08a1c713faa6fad03da7998bd4e875d54a36c37b0be32a7d02683e77fc0861d2d0ab6e590f62a388d86c22358a5411b2e51e22c2896c59d7f7d0b35b

  • SSDEEP

    49152:sjvk2d9rJpNJ6jUFdXaDoIHmXMupzh72lxakn2YpHdy4ZBgIoooNe:srkI9rSjA5aDo73pzF2bz3p9y4HgIoov

Malware Config

Targets

    • Target

      fd3e1ccf6c0e3b6f64f92103eee7725cbde6d5b026eb1670c245956a4f36fcc7

    • Size

      2.3MB

    • MD5

      4708a6f3b23d145ee3f206689a9a6351

    • SHA1

      c5b5a3de453c3a1481e8c3bfe3620870748e3e62

    • SHA256

      fd3e1ccf6c0e3b6f64f92103eee7725cbde6d5b026eb1670c245956a4f36fcc7

    • SHA512

      956eac7b08a1c713faa6fad03da7998bd4e875d54a36c37b0be32a7d02683e77fc0861d2d0ab6e590f62a388d86c22358a5411b2e51e22c2896c59d7f7d0b35b

    • SSDEEP

      49152:sjvk2d9rJpNJ6jUFdXaDoIHmXMupzh72lxakn2YpHdy4ZBgIoooNe:srkI9rSjA5aDo73pzF2bz3p9y4HgIoov

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks