General

  • Target

    4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204

  • Size

    440KB

  • Sample

    221121-lc7jcada38

  • MD5

    1eb8033b1a5cc820d35e9817dc78c7a0

  • SHA1

    2bc4af70087979ecba6277ba323e3685eb5c5af1

  • SHA256

    4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204

  • SHA512

    238bd8332fb213f71eec34f3227f288dbac2b8cea70ae5a056dfab7c5b80f2848c0f54c2ca786dc26cc1f42116ef47491363c15d45a3b41d0f96eedd11810f35

  • SSDEEP

    12288:1XGHKWlOrYA/ELs7gCDAilvE48kmX9v7WLkNNZB4:Al4YYkCv848n9zocNZW

Malware Config

Targets

    • Target

      4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204

    • Size

      440KB

    • MD5

      1eb8033b1a5cc820d35e9817dc78c7a0

    • SHA1

      2bc4af70087979ecba6277ba323e3685eb5c5af1

    • SHA256

      4092cdf2af83fb3505bada008f321f8adb270e1e3faf620747744de298a01204

    • SHA512

      238bd8332fb213f71eec34f3227f288dbac2b8cea70ae5a056dfab7c5b80f2848c0f54c2ca786dc26cc1f42116ef47491363c15d45a3b41d0f96eedd11810f35

    • SSDEEP

      12288:1XGHKWlOrYA/ELs7gCDAilvE48kmX9v7WLkNNZB4:Al4YYkCv848n9zocNZW

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks