General

  • Target

    c786e2f5e11dcbc288ad8010e094c719cc17340c7e20e292f961640ab3b5e112

  • Size

    447KB

  • Sample

    221121-la5xqsch53

  • MD5

    27f0e4bd694a0b4aa4c7ac9b5f41e9c0

  • SHA1

    9c0b59d7c94d2e1fddf0191480fb05cf8bedc43d

  • SHA256

    c786e2f5e11dcbc288ad8010e094c719cc17340c7e20e292f961640ab3b5e112

  • SHA512

    f9a3d5829b8c62c827f2e9fc4292e33abea254f73f11e92c51eb4bc5709667bc965ba2bca0065d88380aca384aaab046708b043b8c37c8efc728c4b785fdf2ac

  • SSDEEP

    12288:GrPsuYx8U4ie38JqfQFCoceIkUshx/I5qzheY7fy4t9UHHhrsY:Grkuq8n380HocivkY7fy4qsY

Malware Config

Targets

    • Target

      c786e2f5e11dcbc288ad8010e094c719cc17340c7e20e292f961640ab3b5e112

    • Size

      447KB

    • MD5

      27f0e4bd694a0b4aa4c7ac9b5f41e9c0

    • SHA1

      9c0b59d7c94d2e1fddf0191480fb05cf8bedc43d

    • SHA256

      c786e2f5e11dcbc288ad8010e094c719cc17340c7e20e292f961640ab3b5e112

    • SHA512

      f9a3d5829b8c62c827f2e9fc4292e33abea254f73f11e92c51eb4bc5709667bc965ba2bca0065d88380aca384aaab046708b043b8c37c8efc728c4b785fdf2ac

    • SSDEEP

      12288:GrPsuYx8U4ie38JqfQFCoceIkUshx/I5qzheY7fy4t9UHHhrsY:Grkuq8n380HocivkY7fy4qsY

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks