General

  • Target

    8a1c3ee0e1919990ff018eb286566b50.bin

  • Size

    124KB

  • Sample

    210416-fketegwndx

  • MD5

    3c93f5734de703d7ad198d2dad3b7ca4

  • SHA1

    e9e4531a8aa8275fbf9b0e480eaeacd4f5a932b3

  • SHA256

    c71384686c8caa0a72dcc7e0a4e93f56b8c66f9523fa1498ec9cf1794144ad70

  • SHA512

    eb12c08e4dbca51410c9cd52abe113f01b1951dbe1f13918f927d8c9545de423a27c4377f2ff919f901d5a91ba3f527c0d8e531514b5220f9bbb8bc4b374b35d

Malware Config

Targets

    • Target

      8a1c3ee0e1919990ff018eb286566b50.bin

    • Size

      124KB

    • MD5

      3c93f5734de703d7ad198d2dad3b7ca4

    • SHA1

      e9e4531a8aa8275fbf9b0e480eaeacd4f5a932b3

    • SHA256

      c71384686c8caa0a72dcc7e0a4e93f56b8c66f9523fa1498ec9cf1794144ad70

    • SHA512

      eb12c08e4dbca51410c9cd52abe113f01b1951dbe1f13918f927d8c9545de423a27c4377f2ff919f901d5a91ba3f527c0d8e531514b5220f9bbb8bc4b374b35d

    • Drops file in Drivers directory

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks