General

  • Target

    872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836

  • Size

    512KB

  • Sample

    221002-ycfrvafhg3

  • MD5

    6d7c5c13fecadc33c9291e0970a3c560

  • SHA1

    8d62c7582edd61327c891b28c63722a3c5bf2004

  • SHA256

    872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836

  • SHA512

    45c82a7f836bb3030be2989879fbc484e10bd377f59e48cca4d2f7a712f98930ad818ae00bc80c3ceee4cbb5352a691d12e092a568d62d80405a932c804e6bab

  • SSDEEP

    12288:tie8FYDUmK2zYPcLBLlZl5srEpOlTMTTOAEqYddeGvV4LU:vGYDZ3LVlZQZyTOAEqYDeO4o

Malware Config

Targets

    • Target

      872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836

    • Size

      512KB

    • MD5

      6d7c5c13fecadc33c9291e0970a3c560

    • SHA1

      8d62c7582edd61327c891b28c63722a3c5bf2004

    • SHA256

      872d969ae6acfe9fb2608d39d6d3867f170032fdc275ea6ce1475637ab8d9836

    • SHA512

      45c82a7f836bb3030be2989879fbc484e10bd377f59e48cca4d2f7a712f98930ad818ae00bc80c3ceee4cbb5352a691d12e092a568d62d80405a932c804e6bab

    • SSDEEP

      12288:tie8FYDUmK2zYPcLBLlZl5srEpOlTMTTOAEqYddeGvV4LU:vGYDZ3LVlZQZyTOAEqYDeO4o

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks