General

  • Target

    be1f6aa3d2c2d61721aa96d8530a65387591252248de520ffed4bfdde0368dde.bin.sample

  • Size

    425KB

  • Sample

    201224-what5d3t6n

  • MD5

    c486aedae4bb88c1bd5064f12df7e188

  • SHA1

    9880e8a0655cf1d0dad855703b85e1bb9bd4db82

  • SHA256

    be1f6aa3d2c2d61721aa96d8530a65387591252248de520ffed4bfdde0368dde

  • SHA512

    fbcccfbc92782740ad542038b2ae3b0d6926d87deeaed6f25dbcf1db4bc00a36af1fe8e74a642fd6a40ee625199b210fad119afbc2a5b7c87c96f603343b2f16

Malware Config

Targets

    • Target

      be1f6aa3d2c2d61721aa96d8530a65387591252248de520ffed4bfdde0368dde.bin.sample

    • Size

      425KB

    • MD5

      c486aedae4bb88c1bd5064f12df7e188

    • SHA1

      9880e8a0655cf1d0dad855703b85e1bb9bd4db82

    • SHA256

      be1f6aa3d2c2d61721aa96d8530a65387591252248de520ffed4bfdde0368dde

    • SHA512

      fbcccfbc92782740ad542038b2ae3b0d6926d87deeaed6f25dbcf1db4bc00a36af1fe8e74a642fd6a40ee625199b210fad119afbc2a5b7c87c96f603343b2f16

    Score
    8/10
    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks