General

  • Target

    7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043

  • Size

    1.1MB

  • Sample

    221002-ycke2ahebr

  • MD5

    6c45ba0dcd794107468431afe2d66420

  • SHA1

    8f980b4e7fc459762a2d6797b6ccaa52ccb01e72

  • SHA256

    7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043

  • SHA512

    307486863bcb3f090a95a5b9f2b5e9363401340f3ce636388a07d13c0c89dbb71f6760366bc6cc2d915ccc4f06a28a53efaa5dcca33077f76388ffe3700dced3

  • SSDEEP

    24576:U6W58thO1sj8IqMvgyFnT0Cjt/FbZxsMCzb04EDuVvuNj:nthl7qM1hjt/VLW3lEDuVvuNj

Malware Config

Targets

    • Target

      7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043

    • Size

      1.1MB

    • MD5

      6c45ba0dcd794107468431afe2d66420

    • SHA1

      8f980b4e7fc459762a2d6797b6ccaa52ccb01e72

    • SHA256

      7f9e4c2f680a72caed61e2088ced74794ef4bd07691b36024d5bef0649bc0043

    • SHA512

      307486863bcb3f090a95a5b9f2b5e9363401340f3ce636388a07d13c0c89dbb71f6760366bc6cc2d915ccc4f06a28a53efaa5dcca33077f76388ffe3700dced3

    • SSDEEP

      24576:U6W58thO1sj8IqMvgyFnT0Cjt/FbZxsMCzb04EDuVvuNj:nthl7qM1hjt/VLW3lEDuVvuNj

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks