General

  • Target

    8a1c3ee0e1919990ff018eb286566b50.bin.zip

  • Size

    90KB

  • Sample

    210416-8hw4z3tfgn

  • MD5

    cd39b44d3a2e3e307e0884244291a251

  • SHA1

    67e76c00ba5e7234e923c44531700ae1e23159b8

  • SHA256

    bc901b4ce447206ee2fff7060df6a992435ec5d0d0432750c64c5965c803bb53

  • SHA512

    9b458549afb926109748b291b406a7b3905fcc02d06baf1014e891cdf10fd2088ebdeeba8dddeb400db880ad3e64bd16cabbe22f11c0bfa25385692ca6d669f8

Malware Config

Targets

    • Target

      8a1c3ee0e1919990ff018eb286566b50.bin

    • Size

      124KB

    • MD5

      3c93f5734de703d7ad198d2dad3b7ca4

    • SHA1

      e9e4531a8aa8275fbf9b0e480eaeacd4f5a932b3

    • SHA256

      c71384686c8caa0a72dcc7e0a4e93f56b8c66f9523fa1498ec9cf1794144ad70

    • SHA512

      eb12c08e4dbca51410c9cd52abe113f01b1951dbe1f13918f927d8c9545de423a27c4377f2ff919f901d5a91ba3f527c0d8e531514b5220f9bbb8bc4b374b35d

    • Drops file in Drivers directory

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks