General

  • Target

    68f3893a89aa27exeexeexeex.exe

  • Size

    195KB

  • Sample

    230708-lqwc8sdh33

  • MD5

    68f3893a89aa279a8f6e1d5af7da7dd5

  • SHA1

    8583cbed9e6df9c8a545503d889f7a3a3f95b651

  • SHA256

    6089de32c299a11563bfad6d781504515959d3714fdd910611e7b71e25316de8

  • SHA512

    bb9b30768be5ff9cfb0592bdcf5c8669760e29357effef130d4d9fc5c8c6f3db7aaab7509842fd16c55701b5baa7bd584828275a22cd77c1e290073284c20220

  • SSDEEP

    3072:5QJMzz2qO8JDa3RWi1AStpZcayvuj35LQJaEvrmcKJHPU/u4F+ezCpspCX:QM3HLaBLASu7uj5Ks/ovzK6K

Malware Config

Targets

    • Target

      68f3893a89aa27exeexeexeex.exe

    • Size

      195KB

    • MD5

      68f3893a89aa279a8f6e1d5af7da7dd5

    • SHA1

      8583cbed9e6df9c8a545503d889f7a3a3f95b651

    • SHA256

      6089de32c299a11563bfad6d781504515959d3714fdd910611e7b71e25316de8

    • SHA512

      bb9b30768be5ff9cfb0592bdcf5c8669760e29357effef130d4d9fc5c8c6f3db7aaab7509842fd16c55701b5baa7bd584828275a22cd77c1e290073284c20220

    • SSDEEP

      3072:5QJMzz2qO8JDa3RWi1AStpZcayvuj35LQJaEvrmcKJHPU/u4F+ezCpspCX:QM3HLaBLASu7uj5Ks/ovzK6K

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks