General

  • Target

    e541070719be61740fca6a38e6c26475b091dd6843a332c69afbceb712b3f319

  • Size

    790KB

  • Sample

    221121-lam2xsgd8y

  • MD5

    3b0fbbe2f9eae81bcf679c44446b0e10

  • SHA1

    f6283e85b5088a9b98944749e93422b5044e7514

  • SHA256

    e541070719be61740fca6a38e6c26475b091dd6843a332c69afbceb712b3f319

  • SHA512

    c944dde6f6d10e2f5a90aee5c939f4aed2a96d19034e4147c1383a22a0fd7ef82af43c0c99d4b022c8884ce2de79219f1f3d1428f467da490295e2df80634d74

  • SSDEEP

    12288:oDNkjRFgUQhCrF0lZF+atQ4N3Uz8vudkCZO82y1ZVqEFUyIbo3kkQSw14+27:cN7jsF0lieQoEzfdZnkkd7

Malware Config

Targets

    • Target

      e541070719be61740fca6a38e6c26475b091dd6843a332c69afbceb712b3f319

    • Size

      790KB

    • MD5

      3b0fbbe2f9eae81bcf679c44446b0e10

    • SHA1

      f6283e85b5088a9b98944749e93422b5044e7514

    • SHA256

      e541070719be61740fca6a38e6c26475b091dd6843a332c69afbceb712b3f319

    • SHA512

      c944dde6f6d10e2f5a90aee5c939f4aed2a96d19034e4147c1383a22a0fd7ef82af43c0c99d4b022c8884ce2de79219f1f3d1428f467da490295e2df80634d74

    • SSDEEP

      12288:oDNkjRFgUQhCrF0lZF+atQ4N3Uz8vudkCZO82y1ZVqEFUyIbo3kkQSw14+27:cN7jsF0lieQoEzfdZnkkd7

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks