General

  • Target

    6c39c5f5d143700d4ad43b0aa7fb6a51e77817060467cf3462ef037176e1f50f.exe

  • Size

    54KB

  • Sample

    220615-nykmtaeddl

  • MD5

    057d8c68bf4ce08bda3f9bd96c04bd25

  • SHA1

    60428ec831ff15fe3e5019e8517af06da1196b96

  • SHA256

    6c39c5f5d143700d4ad43b0aa7fb6a51e77817060467cf3462ef037176e1f50f

  • SHA512

    87a48943600a1d5782edaf76fd422d3d66e571a2f907dc99dddded81e25275b8fb332e04f79078d90d2a7abcdcc95c7dc10244ef91c3f272b9bbbbd180db17a4

Malware Config

Targets

    • Target

      6c39c5f5d143700d4ad43b0aa7fb6a51e77817060467cf3462ef037176e1f50f.exe

    • Size

      54KB

    • MD5

      057d8c68bf4ce08bda3f9bd96c04bd25

    • SHA1

      60428ec831ff15fe3e5019e8517af06da1196b96

    • SHA256

      6c39c5f5d143700d4ad43b0aa7fb6a51e77817060467cf3462ef037176e1f50f

    • SHA512

      87a48943600a1d5782edaf76fd422d3d66e571a2f907dc99dddded81e25275b8fb332e04f79078d90d2a7abcdcc95c7dc10244ef91c3f272b9bbbbd180db17a4

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v6

Tasks