General

  • Target

    de39e11db0715476003a4fefeb267588ed1036b6225c9585ebcd7b8cf6e2eea5

  • Size

    441KB

  • Sample

    221020-n67gjscfdr

  • MD5

    42809c078dbe32f572efe3f74333b050

  • SHA1

    22999e84b091bd8aa3cd4da063cda324047bd75a

  • SHA256

    de39e11db0715476003a4fefeb267588ed1036b6225c9585ebcd7b8cf6e2eea5

  • SHA512

    c3cab7f0a1ce5e5972bac024b05a610262e5911b6d8e7a91a3eaae886f9ad6351f1f176d0eca621feb3df92c8ddcdcaddf3b5f993193b3c43af04857d9dd95ab

  • SSDEEP

    12288:OM0+yeYTYCOPUwHqt7Hb4OW3h8DxKvy3kqY:B0+y5TjEHhCYv7L

Malware Config

Targets

    • Target

      de39e11db0715476003a4fefeb267588ed1036b6225c9585ebcd7b8cf6e2eea5

    • Size

      441KB

    • MD5

      42809c078dbe32f572efe3f74333b050

    • SHA1

      22999e84b091bd8aa3cd4da063cda324047bd75a

    • SHA256

      de39e11db0715476003a4fefeb267588ed1036b6225c9585ebcd7b8cf6e2eea5

    • SHA512

      c3cab7f0a1ce5e5972bac024b05a610262e5911b6d8e7a91a3eaae886f9ad6351f1f176d0eca621feb3df92c8ddcdcaddf3b5f993193b3c43af04857d9dd95ab

    • SSDEEP

      12288:OM0+yeYTYCOPUwHqt7Hb4OW3h8DxKvy3kqY:B0+y5TjEHhCYv7L

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks