Resubmissions

04-11-2022 23:59

221104-31zxvacbc3 8

24-12-2020 17:30

201224-s43rdxvlqn 8

General

  • Target

    fd32cec288cec4f16dc5430cf86dc17e1d4cf941d635979fc17a59c8d6d83d44.bin.sample.gz

  • Size

    26KB

  • Sample

    201224-s43rdxvlqn

  • MD5

    b95f50738e4ef830f1d077933401b6eb

  • SHA1

    99a5ac82d8109a8a769fb09cab93cec46310f757

  • SHA256

    9ce24664cc2fa049bf12d41471939252c295ccf893f00bdc754d73aec1c84b5e

  • SHA512

    71935bfa4746d126d88496145dad7927dd55a20dd51ac1bba420f63848f79d99bd5f2e45fabfea5f64f2bcb3d1c1205331924c9d630197b03d770c40f22d155b

Malware Config

Targets

    • Target

      sample

    • Size

      26KB

    • MD5

      c7cfaca6501361febe27a6b3e66a61bf

    • SHA1

      55a3414b9668596e120139a059db91a306281dcc

    • SHA256

      fd32cec288cec4f16dc5430cf86dc17e1d4cf941d635979fc17a59c8d6d83d44

    • SHA512

      490814ad45e81ca6712c179fc6f9849788da1e379a02597136a52cc8695d895b648676f1ae2ee200effdac0f0dac7d56bef0af3b6854c8c150f33120af4d75a1

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • JavaScript code in executable

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks