General

  • Target

    ae6f5bd5f6e595a57111e6d19a2ab86c6c0c2fa052d19e4d5d8800c19d3833b4

  • Size

    127KB

  • Sample

    250120-k5rg6aslbj

  • MD5

    42e84c6f2061b4163dc5d65a3bf74eb0

  • SHA1

    73aea92c5e1eb89c5c5b99d67e16e8544ced066c

  • SHA256

    ae6f5bd5f6e595a57111e6d19a2ab86c6c0c2fa052d19e4d5d8800c19d3833b4

  • SHA512

    c6990eae21e8b6271f9d07fe8025848765b39c7951ffa2536387a173fb5a4ed33ee02f67a080a058b6c0b5072d0001908d90e9dbbc2ff410ed391c998f86944d

  • SSDEEP

    3072:oOjWuyt0ZHqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPz:oIH9OKofHfHTXQLzgvnzHPowYbvrjD/e

Malware Config

Targets

    • Target

      ae6f5bd5f6e595a57111e6d19a2ab86c6c0c2fa052d19e4d5d8800c19d3833b4

    • Size

      127KB

    • MD5

      42e84c6f2061b4163dc5d65a3bf74eb0

    • SHA1

      73aea92c5e1eb89c5c5b99d67e16e8544ced066c

    • SHA256

      ae6f5bd5f6e595a57111e6d19a2ab86c6c0c2fa052d19e4d5d8800c19d3833b4

    • SHA512

      c6990eae21e8b6271f9d07fe8025848765b39c7951ffa2536387a173fb5a4ed33ee02f67a080a058b6c0b5072d0001908d90e9dbbc2ff410ed391c998f86944d

    • SSDEEP

      3072:oOjWuyt0ZHqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPz:oIH9OKofHfHTXQLzgvnzHPowYbvrjD/e

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks