General
-
Target
Photo-125-137.jpg.scr.zip
-
Size
13KB
-
Sample
201103-yqdbwpye9x
-
MD5
671ee9d73d4b0bff89c934ecf24e4703
-
SHA1
86f105663a68c27bccb3889c48665c0561d0d056
-
SHA256
9a29568fb06b15f7a2f3f89474c27141965b0cf824c4cfbd9e2a97585fd1de1e
-
SHA512
d7f16c6d8e4332de77c2c53ccc0e8f73708f8e78fb274a76d2c25b38471f13a15e9dff6c1096f34676de63b48b69e2af09367530a1f1e31039c4ef28b3db8c4d
Static task
static1
Behavioral task
behavioral1
Sample
Photo-125-137.jpg.scr
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Photo-125-137.jpg.scr
Resource
win10v20201028
Malware Config
Extracted
C:\4281278655928\Read_Me.txt
http://25xb3kc6azicbbuo.onion/?NDSIYNDS
http://helpqvrg3cc5mvb3.onion/
Extracted
C:\7129197363678\Read_Me.txt
http://25xb3kc6azicbbuo.onion/?XPQSTVXY
http://helpqvrg3cc5mvb3.onion/
Targets
-
-
Target
Photo-125-137.jpg.scr
-
Size
13KB
-
MD5
16ce76113dfce837053c655053129aee
-
SHA1
13f726b49edf5975962979a00747dda1303accb1
-
SHA256
59afd802f051196913f08d88343bdeeb92ba957a4b123844a521e9c4e238d1fb
-
SHA512
4d284260cf3aaa0a8e460bf3da1aa18984b8c29caa9e6f81ba5246a58f26148f35b48accdff3bd458432a6398d40c74c1a3b6589c3d8eaaafc6e26d2f4d8cd75
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Modifies service
-
MITRE ATT&CK Matrix
Collection
Data from Local System
1Command and Control
Credential Access
Credentials in Files
1Discovery
Query Registry
1System Information Discovery
1Peripheral Device Discovery
1Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Privilege Escalation