General

  • Target

    ba389eb9da179c8723afac65c68c5ae4e0749a25af341d5468b4cdf2a8b7a262

  • Size

    12.1MB

  • Sample

    220325-1w1mgachd2

  • MD5

    d73d942548aea3b0eecc66ba8159f96b

  • SHA1

    74b1a9d702724ddc79579673de073aaa36946db4

  • SHA256

    ba389eb9da179c8723afac65c68c5ae4e0749a25af341d5468b4cdf2a8b7a262

  • SHA512

    2029353a3c124dbf6629777e36c2f8f8ac6bdbabe11e5343d54ac5ff0b54368277fb8a9c90b51a49461f7bf8e8e2100844559bba522aaf408964b473aa64cfd0

Malware Config

Targets

    • Target

      ba389eb9da179c8723afac65c68c5ae4e0749a25af341d5468b4cdf2a8b7a262

    • Size

      12.1MB

    • MD5

      d73d942548aea3b0eecc66ba8159f96b

    • SHA1

      74b1a9d702724ddc79579673de073aaa36946db4

    • SHA256

      ba389eb9da179c8723afac65c68c5ae4e0749a25af341d5468b4cdf2a8b7a262

    • SHA512

      2029353a3c124dbf6629777e36c2f8f8ac6bdbabe11e5343d54ac5ff0b54368277fb8a9c90b51a49461f7bf8e8e2100844559bba522aaf408964b473aa64cfd0

    • DemonWare

      Ransomware first seen in mid-2020.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks