General

  • Target

    999766eac0319aexeexeexeex.exe

  • Size

    185KB

  • Sample

    230709-nd5r9acg35

  • MD5

    999766eac0319ae8cfbbda2ecf496d3d

  • SHA1

    d511634e8f067f6266cee3997c55feddfa212733

  • SHA256

    f1703e7b6ce37b8e9e59def975fad8adce23ea0a73844e249c8e89968c521154

  • SHA512

    dbabaf35d535295c1d7787bbb0cd5849798852bfdf4aecc07a7c46de339a691cf2bf00cd24291cebb56c8404fbf42d87df5eebbce6801272c1d54fce6bd865e1

  • SSDEEP

    3072:KFCe6/bc8ZN3QAtj88EJ/c9SGDglw3mRYh4hflAqcAOGb0AAr0cOalA9TNh1kqli:yC3v1G/c9LDqRbg5yrGkbDXmUgD

Malware Config

Targets

    • Target

      999766eac0319aexeexeexeex.exe

    • Size

      185KB

    • MD5

      999766eac0319ae8cfbbda2ecf496d3d

    • SHA1

      d511634e8f067f6266cee3997c55feddfa212733

    • SHA256

      f1703e7b6ce37b8e9e59def975fad8adce23ea0a73844e249c8e89968c521154

    • SHA512

      dbabaf35d535295c1d7787bbb0cd5849798852bfdf4aecc07a7c46de339a691cf2bf00cd24291cebb56c8404fbf42d87df5eebbce6801272c1d54fce6bd865e1

    • SSDEEP

      3072:KFCe6/bc8ZN3QAtj88EJ/c9SGDglw3mRYh4hflAqcAOGb0AAr0cOalA9TNh1kqli:yC3v1G/c9LDqRbg5yrGkbDXmUgD

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks