General

  • Target

    0b4c272f0abc687c36f25c88a6022c20dac675250054a8bbfd66e43a5f650af2

  • Size

    827KB

  • Sample

    221020-pahc8acggr

  • MD5

    812b7d93dce35132959c15ae456026f0

  • SHA1

    4f662d1337c809b5066f22263a738009d6730fa2

  • SHA256

    0b4c272f0abc687c36f25c88a6022c20dac675250054a8bbfd66e43a5f650af2

  • SHA512

    16728a001d97770d3a2f65cb0b31e99c253e27f400d6aa3a22bab4c1c98a43011e2a5a8340cdaf138dd15ad9dad0dfa76efeb186c8871824824c1e0334ffc2cc

  • SSDEEP

    12288:pc+8NxV1+BiJILlUjvf1FPfCXy6AXJm4s+bzHVvBPf9oETTu6MfQtVrMFjN8pQJ:AXA8JILc1R9I8zHzH9oEXu6MqpQJ

Malware Config

Targets

    • Target

      0b4c272f0abc687c36f25c88a6022c20dac675250054a8bbfd66e43a5f650af2

    • Size

      827KB

    • MD5

      812b7d93dce35132959c15ae456026f0

    • SHA1

      4f662d1337c809b5066f22263a738009d6730fa2

    • SHA256

      0b4c272f0abc687c36f25c88a6022c20dac675250054a8bbfd66e43a5f650af2

    • SHA512

      16728a001d97770d3a2f65cb0b31e99c253e27f400d6aa3a22bab4c1c98a43011e2a5a8340cdaf138dd15ad9dad0dfa76efeb186c8871824824c1e0334ffc2cc

    • SSDEEP

      12288:pc+8NxV1+BiJILlUjvf1FPfCXy6AXJm4s+bzHVvBPf9oETTu6MfQtVrMFjN8pQJ:AXA8JILc1R9I8zHzH9oEXu6MqpQJ

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks