General

  • Target

    00ba627a69321482af46447244bb7426

  • Size

    137KB

  • Sample

    231225-c8qe9scgbl

  • MD5

    00ba627a69321482af46447244bb7426

  • SHA1

    7fdde939cb0e0fc204c2919d1f31b2258ca6c8a8

  • SHA256

    7b9b58abc9cded2ecc9418a93188bca5b24b88263dbfebb446b0560e1fee006c

  • SHA512

    e41406143669a2997020ed131023acb9ed83de417ddfe13fa8ae0db912bb42f466e8751034f0db8743f113fb2136cc47fb3e1f540321ff169eadc929ba397a69

  • SSDEEP

    3072:9xwR1+LmuueNS1Oo/xH56YpBhUDdKh8V+J/6WJkc+etOq7x:PjLlueN4OoBhpBAfVciWkQ

Malware Config

Targets

    • Target

      00ba627a69321482af46447244bb7426

    • Size

      137KB

    • MD5

      00ba627a69321482af46447244bb7426

    • SHA1

      7fdde939cb0e0fc204c2919d1f31b2258ca6c8a8

    • SHA256

      7b9b58abc9cded2ecc9418a93188bca5b24b88263dbfebb446b0560e1fee006c

    • SHA512

      e41406143669a2997020ed131023acb9ed83de417ddfe13fa8ae0db912bb42f466e8751034f0db8743f113fb2136cc47fb3e1f540321ff169eadc929ba397a69

    • SSDEEP

      3072:9xwR1+LmuueNS1Oo/xH56YpBhUDdKh8V+J/6WJkc+etOq7x:PjLlueN4OoBhpBAfVciWkQ

    • Renames multiple (218) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks