General

  • Target

    ed3d5a5dca8674c45e14c0ccf3bc22e706fb6cf9fe8e1f02aced8c921290a07b

  • Size

    443KB

  • Sample

    221001-vyym1ahedk

  • MD5

    643a5cf62c11211cd1e31c79fd3de120

  • SHA1

    8a2af357f011d896c4621dddd4d5462e6e952772

  • SHA256

    ed3d5a5dca8674c45e14c0ccf3bc22e706fb6cf9fe8e1f02aced8c921290a07b

  • SHA512

    ff999f14023219a194bd7e4ad3f4e0f0c3d1c99c244efe35db0edf1eed91d7e9ddf7a386a3c49384e9ba3c29a6734207dfe78677c5ba217295f5f26234d5c47b

  • SSDEEP

    12288:kXWpBo7Z3X4w+DokCvzwGfYducu2QnXp8vRL/TI:Kj8CsGMutXpsL/TI

Malware Config

Targets

    • Target

      ed3d5a5dca8674c45e14c0ccf3bc22e706fb6cf9fe8e1f02aced8c921290a07b

    • Size

      443KB

    • MD5

      643a5cf62c11211cd1e31c79fd3de120

    • SHA1

      8a2af357f011d896c4621dddd4d5462e6e952772

    • SHA256

      ed3d5a5dca8674c45e14c0ccf3bc22e706fb6cf9fe8e1f02aced8c921290a07b

    • SHA512

      ff999f14023219a194bd7e4ad3f4e0f0c3d1c99c244efe35db0edf1eed91d7e9ddf7a386a3c49384e9ba3c29a6734207dfe78677c5ba217295f5f26234d5c47b

    • SSDEEP

      12288:kXWpBo7Z3X4w+DokCvzwGfYducu2QnXp8vRL/TI:Kj8CsGMutXpsL/TI

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks