General

  • Target

    cf084e073b35baf369537217d7f99aeab0a8e5d463a97aab54710b2987d783a5

  • Size

    522KB

  • Sample

    221001-vzh9psheer

  • MD5

    73f0ee43991098128a5a608a06696460

  • SHA1

    5bf7a312914ac9deef9bd64e209a761aa1f3becc

  • SHA256

    cf084e073b35baf369537217d7f99aeab0a8e5d463a97aab54710b2987d783a5

  • SHA512

    44243a524eac5a934d4f3304b72d56edbb5a00a791c257b74d6a2a23a7cd75eb2be09135fbd5ec6f5ed885d3e14fac055acd7dd8e09f634004f0714b49ee96b6

  • SSDEEP

    12288:rFdrIsRSm37vS62d4vUXjezByaeDp3ne/jC1Ehz1s:/BS0KT4qezByaOf1Q1s

Malware Config

Targets

    • Target

      cf084e073b35baf369537217d7f99aeab0a8e5d463a97aab54710b2987d783a5

    • Size

      522KB

    • MD5

      73f0ee43991098128a5a608a06696460

    • SHA1

      5bf7a312914ac9deef9bd64e209a761aa1f3becc

    • SHA256

      cf084e073b35baf369537217d7f99aeab0a8e5d463a97aab54710b2987d783a5

    • SHA512

      44243a524eac5a934d4f3304b72d56edbb5a00a791c257b74d6a2a23a7cd75eb2be09135fbd5ec6f5ed885d3e14fac055acd7dd8e09f634004f0714b49ee96b6

    • SSDEEP

      12288:rFdrIsRSm37vS62d4vUXjezByaeDp3ne/jC1Ehz1s:/BS0KT4qezByaOf1Q1s

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks