General

  • Target

    13105178006.zip

  • Size

    91KB

  • Sample

    231122-llzj4acb6t

  • MD5

    39130a2be8af77d2ae8a1407e87ceafa

  • SHA1

    093a518fa0e3124ea4c2df6360e33ca97eb159a9

  • SHA256

    e4898fb7eb134472a8a7828b5c7e18497cf8aa4e1a6fc8049b7d4da764321694

  • SHA512

    764c58b2e95c9d69682abad9e1e97f6b0bb49bdd2a3ffad0ec42ca4392d47251c04394fe934d95d10af0fe88e9f5ddde3027a4c7e6a16ace6ccdea5f5862ebfe

  • SSDEEP

    1536:NDRzix9s1O9eZ5kT9xb0AXnczZxpMdCeA5vsb8f2UeHWE6QMM0CB1m:Nxixi1bZ6T9xBXn60Ce4vmfOE6QF0o1m

Malware Config

Targets

    • Target

      222e2b91f5becea8c7c05883e4a58796a1f68628fbb0852b533fed08d8e9b853

    • Size

      224KB

    • MD5

      033acf3b0f699a39becdc71d3e2dddcc

    • SHA1

      5949c404aee552fc8ce29e3bf77bd08e54d37c59

    • SHA256

      222e2b91f5becea8c7c05883e4a58796a1f68628fbb0852b533fed08d8e9b853

    • SHA512

      604ba9e02ec18b8ad1005ec3d86970261925a1d2c198a975387beb62a9711012733b92e7641a5687af835cf1ddb5b6c6d732b33a12387a3a293ca08929f7fb50

    • SSDEEP

      3072:xtsD+K6k7UXP6ih6XULC9GHJkmm8GxTyPGryXdEekUuIiMi:4D+33P6Y6XGpY8G5yore3u5Mi

    • Meow

      A ransomware that wipes unsecured databases first seen in Mid 2020.

    • Renames multiple (5368) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Renames multiple (7958) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks