General

  • Target

    7bb62a1edd5f9f56e9d9ca31451034831961358839c12ea73a29faa160b7db84

  • Size

    154KB

  • Sample

    210515-wx5w46xz6e

  • MD5

    6496c79fa5ea7fcadc63204ac7486736

  • SHA1

    1e4b8f0c2deb96fda4f007ffd9413746b73ca04d

  • SHA256

    7bb62a1edd5f9f56e9d9ca31451034831961358839c12ea73a29faa160b7db84

  • SHA512

    3f845fb9e7df300f39c3ba24a20fdf07e49eaa92b65ff63bd65b3550c99bc2bc9822c1ebb2d5c83d386806fcde7a4bcf8d3529fea040479fefca25a05da334b8

Malware Config

Targets

    • Target

      7bb62a1edd5f9f56e9d9ca31451034831961358839c12ea73a29faa160b7db84

    • Size

      154KB

    • MD5

      6496c79fa5ea7fcadc63204ac7486736

    • SHA1

      1e4b8f0c2deb96fda4f007ffd9413746b73ca04d

    • SHA256

      7bb62a1edd5f9f56e9d9ca31451034831961358839c12ea73a29faa160b7db84

    • SHA512

      3f845fb9e7df300f39c3ba24a20fdf07e49eaa92b65ff63bd65b3550c99bc2bc9822c1ebb2d5c83d386806fcde7a4bcf8d3529fea040479fefca25a05da334b8

    • BadRabbit

      Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks