General

  • Target

    aa02c774182b612a1123b73b853c921bc27696d97470aaaa10f7bc3ac01ecdf1

  • Size

    623KB

  • Sample

    210511-jn6a7kwqaa

  • MD5

    00e7713c90a8b8a9a74ed4db919091c3

  • SHA1

    19f0ff155a4cd121a11cc1d15050f744a5153509

  • SHA256

    aa02c774182b612a1123b73b853c921bc27696d97470aaaa10f7bc3ac01ecdf1

  • SHA512

    8ad5756d0fb396d64408723ff29c06783c2b7c92d75478f50460216746449c012031f7f5d83f61aed36aa0cd3521de35a7ae7118c45199c4e78b9f1fbef5e234

Malware Config

Targets

    • Target

      aa02c774182b612a1123b73b853c921bc27696d97470aaaa10f7bc3ac01ecdf1

    • Size

      623KB

    • MD5

      00e7713c90a8b8a9a74ed4db919091c3

    • SHA1

      19f0ff155a4cd121a11cc1d15050f744a5153509

    • SHA256

      aa02c774182b612a1123b73b853c921bc27696d97470aaaa10f7bc3ac01ecdf1

    • SHA512

      8ad5756d0fb396d64408723ff29c06783c2b7c92d75478f50460216746449c012031f7f5d83f61aed36aa0cd3521de35a7ae7118c45199c4e78b9f1fbef5e234

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

5
T1112

Hidden Files and Directories

1
T1158

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks