General

  • Target

    8b78e36ce5fee3exeexeexeex.exe

  • Size

    315KB

  • Sample

    230709-jcg8cabb66

  • MD5

    8b78e36ce5fee3a7afbfd2951b5d4e42

  • SHA1

    9a9f217a02263cc6d662e0111d9f03872c55ce72

  • SHA256

    228f0320b0a741d86dca0915a580c9c793e0e4f8f83139edfaf81ee900f4af38

  • SHA512

    2a7d746763e22c5c8e56c89786c86cd92dad4b6247fb4fb319cab8a6b9553630388cea7ef31fee49aff0c2bc9b52bde82979108239f1eb88a305c2981f71de0a

  • SSDEEP

    6144:Si+4B/StcWOkySsU7HjPD/NzNfFdE9WWbP94YQtHKnvCI1F7q:KI/NJMb3dfazKV

Malware Config

Targets

    • Target

      8b78e36ce5fee3exeexeexeex.exe

    • Size

      315KB

    • MD5

      8b78e36ce5fee3a7afbfd2951b5d4e42

    • SHA1

      9a9f217a02263cc6d662e0111d9f03872c55ce72

    • SHA256

      228f0320b0a741d86dca0915a580c9c793e0e4f8f83139edfaf81ee900f4af38

    • SHA512

      2a7d746763e22c5c8e56c89786c86cd92dad4b6247fb4fb319cab8a6b9553630388cea7ef31fee49aff0c2bc9b52bde82979108239f1eb88a305c2981f71de0a

    • SSDEEP

      6144:Si+4B/StcWOkySsU7HjPD/NzNfFdE9WWbP94YQtHKnvCI1F7q:KI/NJMb3dfazKV

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks