General

  • Target

    f44ca8d9fd93fd903bdf359de82e28ce7f072534fe1a82816e6eefe4f1328b5b

  • Size

    948KB

  • Sample

    221106-x9b99ahbb4

  • MD5

    0db0a8cde156c4a0cfc1cb3f64311430

  • SHA1

    25aa5842ef38284594f446cd7ec576dd11f324c2

  • SHA256

    f44ca8d9fd93fd903bdf359de82e28ce7f072534fe1a82816e6eefe4f1328b5b

  • SHA512

    2d0ad5834154a23a60021d20bc3f7ab264e0b9931e93e247e077f6c56718d6b204e4127613eeb32c4b9f20b1d95c787bda6f4b79db3f87990524d8dbad70bef9

  • SSDEEP

    24576:sUsLCekOjF12RNt8kE6c29/aQydQwj9QE4p0CNn:Xshkm1GNLIQy/j9/MPNn

Malware Config

Targets

    • Target

      f44ca8d9fd93fd903bdf359de82e28ce7f072534fe1a82816e6eefe4f1328b5b

    • Size

      948KB

    • MD5

      0db0a8cde156c4a0cfc1cb3f64311430

    • SHA1

      25aa5842ef38284594f446cd7ec576dd11f324c2

    • SHA256

      f44ca8d9fd93fd903bdf359de82e28ce7f072534fe1a82816e6eefe4f1328b5b

    • SHA512

      2d0ad5834154a23a60021d20bc3f7ab264e0b9931e93e247e077f6c56718d6b204e4127613eeb32c4b9f20b1d95c787bda6f4b79db3f87990524d8dbad70bef9

    • SSDEEP

      24576:sUsLCekOjF12RNt8kE6c29/aQydQwj9QE4p0CNn:Xshkm1GNLIQy/j9/MPNn

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks