General

  • Target

    910f21b7a3e10ae0c325da6b4c5aec10

  • Size

    193KB

  • Sample

    231222-p4xp1adhd7

  • MD5

    910f21b7a3e10ae0c325da6b4c5aec10

  • SHA1

    01707472c49e3d341a85fea765e82c2e29d07f0d

  • SHA256

    791d938d75f1d1e06a8da90ff76effcbe1119d01be7c71f904fede5923040a63

  • SHA512

    17dd50eeca787ae0eabf1bbbfecd4fb5d99104533cc381f0b9cee3a83a10e30ae7039bfc6ab2407abef6c1a721ae532b74d4d46d26983c4948a86e3934f24ed4

  • SSDEEP

    3072:8qFNz7Kfugjgeprk/3aAInd+frfFd1HHYR744KGP1sobJunTbTpCGuGI/2yW7LTQ:TNIdc3Cd+tMi3K6vV1Zlyk0tOBHW

Malware Config

Targets

    • Target

      910f21b7a3e10ae0c325da6b4c5aec10

    • Size

      193KB

    • MD5

      910f21b7a3e10ae0c325da6b4c5aec10

    • SHA1

      01707472c49e3d341a85fea765e82c2e29d07f0d

    • SHA256

      791d938d75f1d1e06a8da90ff76effcbe1119d01be7c71f904fede5923040a63

    • SHA512

      17dd50eeca787ae0eabf1bbbfecd4fb5d99104533cc381f0b9cee3a83a10e30ae7039bfc6ab2407abef6c1a721ae532b74d4d46d26983c4948a86e3934f24ed4

    • SSDEEP

      3072:8qFNz7Kfugjgeprk/3aAInd+frfFd1HHYR744KGP1sobJunTbTpCGuGI/2yW7LTQ:TNIdc3Cd+tMi3K6vV1Zlyk0tOBHW

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (79) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks