General

  • Target

    74f9134782999ef085b03a8bc7260137d937d8c92f2258a85586c893a59ab5d3

  • Size

    1.6MB

  • Sample

    210511-h6vmg1e2gj

  • MD5

    52e7f46143b2f4b3ed5189c3998dc3ff

  • SHA1

    ddd782b6bb399a1d35fd91dd0b08ee19beb24d31

  • SHA256

    74f9134782999ef085b03a8bc7260137d937d8c92f2258a85586c893a59ab5d3

  • SHA512

    d9029bed85045084d93e74897b284d0e1cb6c80d3f76aa32bf3b18420695afa7d660ec744aa50733938b3f1843ff862c42796442fc6df898bf0d65f7925f5b59

Malware Config

Targets

    • Target

      74f9134782999ef085b03a8bc7260137d937d8c92f2258a85586c893a59ab5d3

    • Size

      1.6MB

    • MD5

      52e7f46143b2f4b3ed5189c3998dc3ff

    • SHA1

      ddd782b6bb399a1d35fd91dd0b08ee19beb24d31

    • SHA256

      74f9134782999ef085b03a8bc7260137d937d8c92f2258a85586c893a59ab5d3

    • SHA512

      d9029bed85045084d93e74897b284d0e1cb6c80d3f76aa32bf3b18420695afa7d660ec744aa50733938b3f1843ff862c42796442fc6df898bf0d65f7925f5b59

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

5
T1112

Hidden Files and Directories

1
T1158

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks