General

  • Target

    5bbd7a666d8c77df70eff22bda64822a364ae4001e461b3886ba20c95ecd80a2

  • Size

    568KB

  • Sample

    221118-zfx1zafh35

  • MD5

    3769ceeb706d99e331d5db710c73a4f0

  • SHA1

    44f09e999f1a5c5723983452e46017726f405d83

  • SHA256

    5bbd7a666d8c77df70eff22bda64822a364ae4001e461b3886ba20c95ecd80a2

  • SHA512

    6df88e5fc2b7967446bd349175e11eda8d9c79d0380f1464d945b7e7c0d405c8d4ecb5fd40aca56a5c6cffaf14fced9deab7e96053c26a956fb63bdaa725b009

  • SSDEEP

    12288:zu2hTEEvhRrDjWcRq8DJ0Ja5yR1Sap0D484US5bJ:zvEEvvmCq8J0Ja5W1T/1Z

Malware Config

Targets

    • Target

      5bbd7a666d8c77df70eff22bda64822a364ae4001e461b3886ba20c95ecd80a2

    • Size

      568KB

    • MD5

      3769ceeb706d99e331d5db710c73a4f0

    • SHA1

      44f09e999f1a5c5723983452e46017726f405d83

    • SHA256

      5bbd7a666d8c77df70eff22bda64822a364ae4001e461b3886ba20c95ecd80a2

    • SHA512

      6df88e5fc2b7967446bd349175e11eda8d9c79d0380f1464d945b7e7c0d405c8d4ecb5fd40aca56a5c6cffaf14fced9deab7e96053c26a956fb63bdaa725b009

    • SSDEEP

      12288:zu2hTEEvhRrDjWcRq8DJ0Ja5yR1Sap0D484US5bJ:zvEEvvmCq8J0Ja5W1T/1Z

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Document created with cracked Office version

      Office document contains Grizli777 string known to be caused by using a cracked version of the software.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks