General

  • Target

    b087b219ac5a0dee3c3fc74cea2de84e97938bc49d5f7a9e0070c53181620a50

  • Size

    521KB

  • Sample

    221030-2bd4eaeabn

  • MD5

    a1aaf1465e48df5c209dbae115d4acd0

  • SHA1

    b719faf1ae794b49575a01d2947a0fab47a749b1

  • SHA256

    b087b219ac5a0dee3c3fc74cea2de84e97938bc49d5f7a9e0070c53181620a50

  • SHA512

    9c56e5acb8d986dc2009dacd94ef9005223e45e07f45ea58bae4a819864ac2fa38b9d0e7a67b3ea04de642b17905687ec27e3b6cf1d65b02a6399d2ce69df7c7

  • SSDEEP

    12288:OnMhIvUu3G/OHcYdjYUjy6MdE3sdg86uyZby:OnMg72/ODm2DuYby

Malware Config

Targets

    • Target

      b087b219ac5a0dee3c3fc74cea2de84e97938bc49d5f7a9e0070c53181620a50

    • Size

      521KB

    • MD5

      a1aaf1465e48df5c209dbae115d4acd0

    • SHA1

      b719faf1ae794b49575a01d2947a0fab47a749b1

    • SHA256

      b087b219ac5a0dee3c3fc74cea2de84e97938bc49d5f7a9e0070c53181620a50

    • SHA512

      9c56e5acb8d986dc2009dacd94ef9005223e45e07f45ea58bae4a819864ac2fa38b9d0e7a67b3ea04de642b17905687ec27e3b6cf1d65b02a6399d2ce69df7c7

    • SSDEEP

      12288:OnMhIvUu3G/OHcYdjYUjy6MdE3sdg86uyZby:OnMg72/ODm2DuYby

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks