General

  • Target

    1dcd0f079a72ddd82f144ded212c4c844768474acf59e1cde6ca1194e80fa3a6

  • Size

    179KB

  • Sample

    230911-r1xa6sgg79

  • MD5

    6ecdfd76e99ac7bf571dd21bf4d85fe4

  • SHA1

    3b622b03e700c8f5115e0706e7bd510ba18daaab

  • SHA256

    1dcd0f079a72ddd82f144ded212c4c844768474acf59e1cde6ca1194e80fa3a6

  • SHA512

    42355f470974b0f9ffc3e65331d7384d850858e7c32986d5b004d7384282d9d20c85c5b58e6f0f94784f0ac09c5a669e9241b7a62825fe4b08cbe575df00025f

  • SSDEEP

    3072:kuWvdwxYVLSroutnDnQiREOjijPwAhFbwALCYmgBO8ja+8ewQ0UM44Fn3fzT45:kuAwxVoSnDQi7kRtLCY88ja+8ewQStFI

Malware Config

Targets

    • Target

      1dcd0f079a72ddd82f144ded212c4c844768474acf59e1cde6ca1194e80fa3a6

    • Size

      179KB

    • MD5

      6ecdfd76e99ac7bf571dd21bf4d85fe4

    • SHA1

      3b622b03e700c8f5115e0706e7bd510ba18daaab

    • SHA256

      1dcd0f079a72ddd82f144ded212c4c844768474acf59e1cde6ca1194e80fa3a6

    • SHA512

      42355f470974b0f9ffc3e65331d7384d850858e7c32986d5b004d7384282d9d20c85c5b58e6f0f94784f0ac09c5a669e9241b7a62825fe4b08cbe575df00025f

    • SSDEEP

      3072:kuWvdwxYVLSroutnDnQiREOjijPwAhFbwALCYmgBO8ja+8ewQ0UM44Fn3fzT45:kuAwxVoSnDQi7kRtLCY88ja+8ewQStFI

    • CrypVault

      Ransomware family which makes encrypted files look like they have been quarantined by AV.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks