General

  • Target

    cc00f3a1a1989ebc451dc014766e8bedc0b72a7e62acce0ec53ac1ca64057b6f

  • Size

    511KB

  • Sample

    221001-vzl1lagfa9

  • MD5

    6392b522f6c9b5c5a4f9cca98ab8dc80

  • SHA1

    84677ee4cc36c2b8e03e29271f31aa6e2a7d89fc

  • SHA256

    cc00f3a1a1989ebc451dc014766e8bedc0b72a7e62acce0ec53ac1ca64057b6f

  • SHA512

    3e4172e062ebe5436c88d693af7aa1a176f00c9b195398ce7427284b7f9cf4c06327ac587e1718cc440f73f967d3a2e2a5ece76544bd29802ea53a63c66dd376

  • SSDEEP

    12288:9yo1nNfXRdZJ/JgrjpwQYHX8dVCHDwKS+PZ63+sUrJIaVWMPFOd:PB2rj2QYHX8KHkKJR63+ssiH4O

Malware Config

Targets

    • Target

      cc00f3a1a1989ebc451dc014766e8bedc0b72a7e62acce0ec53ac1ca64057b6f

    • Size

      511KB

    • MD5

      6392b522f6c9b5c5a4f9cca98ab8dc80

    • SHA1

      84677ee4cc36c2b8e03e29271f31aa6e2a7d89fc

    • SHA256

      cc00f3a1a1989ebc451dc014766e8bedc0b72a7e62acce0ec53ac1ca64057b6f

    • SHA512

      3e4172e062ebe5436c88d693af7aa1a176f00c9b195398ce7427284b7f9cf4c06327ac587e1718cc440f73f967d3a2e2a5ece76544bd29802ea53a63c66dd376

    • SSDEEP

      12288:9yo1nNfXRdZJ/JgrjpwQYHX8dVCHDwKS+PZ63+sUrJIaVWMPFOd:PB2rj2QYHX8KHkKJR63+ssiH4O

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks