General

  • Target

    b559d6c8ae637a692d359ac634a8e123bc200177026d4eae0c09f5c6944253c0

  • Size

    441KB

  • Sample

    221106-yaastahbe2

  • MD5

    07c7505a5cd6e61e780aa0d03d19c650

  • SHA1

    a7796ce3b3d29fbaaef09b11d8d12f3a57dc0ef6

  • SHA256

    b559d6c8ae637a692d359ac634a8e123bc200177026d4eae0c09f5c6944253c0

  • SHA512

    fa6c51f9cd6770e2f325ae1516f4bdcc2d2c8525569e9942e0d2c231ed41c4f83dc4091be5d098c0e46254bead1165c8710bea16fd458b7b2b179d370d8fd0da

  • SSDEEP

    6144:RM7+f0N52SVdCnBeGjSbaE6kSpHD75quTpiadhqzpMthaIyedFf6G:O7mSLCnBeGebRWiInqzpMgI1

Malware Config

Targets

    • Target

      b559d6c8ae637a692d359ac634a8e123bc200177026d4eae0c09f5c6944253c0

    • Size

      441KB

    • MD5

      07c7505a5cd6e61e780aa0d03d19c650

    • SHA1

      a7796ce3b3d29fbaaef09b11d8d12f3a57dc0ef6

    • SHA256

      b559d6c8ae637a692d359ac634a8e123bc200177026d4eae0c09f5c6944253c0

    • SHA512

      fa6c51f9cd6770e2f325ae1516f4bdcc2d2c8525569e9942e0d2c231ed41c4f83dc4091be5d098c0e46254bead1165c8710bea16fd458b7b2b179d370d8fd0da

    • SSDEEP

      6144:RM7+f0N52SVdCnBeGjSbaE6kSpHD75quTpiadhqzpMthaIyedFf6G:O7mSLCnBeGebRWiInqzpMgI1

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks