General

  • Target

    5f981e54fbe0a1exeexeexeex.exe

  • Size

    208KB

  • Sample

    230708-kpjglsec31

  • MD5

    5f981e54fbe0a19b8e0710f251a77fe8

  • SHA1

    427cf82c19d7969126ba69cbcc30b4ccb133fc60

  • SHA256

    6e5cdbd5f54e01d26ee902bff3e244290da75641b34211646dce1b154c16b2db

  • SHA512

    6cb3760ac5edcbd58560e6f94712e9fdbbd6ea6a8d87e3ac4bc6d35d0b928e121dd5303ead6b4d4cb368b248b8e7aa73bc7f8f36c62abb61dd09e61423ab48d8

  • SSDEEP

    6144:Z+LZ2oQkUcwk0cxLIrPSp86W2RYd6eSq:Z+LHvfIr2y

Malware Config

Targets

    • Target

      5f981e54fbe0a1exeexeexeex.exe

    • Size

      208KB

    • MD5

      5f981e54fbe0a19b8e0710f251a77fe8

    • SHA1

      427cf82c19d7969126ba69cbcc30b4ccb133fc60

    • SHA256

      6e5cdbd5f54e01d26ee902bff3e244290da75641b34211646dce1b154c16b2db

    • SHA512

      6cb3760ac5edcbd58560e6f94712e9fdbbd6ea6a8d87e3ac4bc6d35d0b928e121dd5303ead6b4d4cb368b248b8e7aa73bc7f8f36c62abb61dd09e61423ab48d8

    • SSDEEP

      6144:Z+LZ2oQkUcwk0cxLIrPSp86W2RYd6eSq:Z+LHvfIr2y

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks