General

  • Target

    1b98e81f1519cf3056e9d792e458143c

  • Size

    484KB

  • Sample

    231225-ntq9sseefr

  • MD5

    1b98e81f1519cf3056e9d792e458143c

  • SHA1

    7280f2dd91e6c023724ac6fe65c16a83f3ae1468

  • SHA256

    4543761f29eac6dfa0711885c17fd079c7182588b2c9ea57de8aebfabce8e1dd

  • SHA512

    ed2af61f93c1cc049994d8eee1716bde286e89235c631c2eddaeaef8a338786001c6734a3957e7180702d143e7ea4b8aa073eac9bc420652fca6228f853e5d62

  • SSDEEP

    12288:vD6kK42nuyp6eCYvBSUEVL+NXxpXDpRCd55agxgGtLkhO23F:vD6kCnuO60UULvzpRCd/aQpLkt

Malware Config

Targets

    • Target

      1b98e81f1519cf3056e9d792e458143c

    • Size

      484KB

    • MD5

      1b98e81f1519cf3056e9d792e458143c

    • SHA1

      7280f2dd91e6c023724ac6fe65c16a83f3ae1468

    • SHA256

      4543761f29eac6dfa0711885c17fd079c7182588b2c9ea57de8aebfabce8e1dd

    • SHA512

      ed2af61f93c1cc049994d8eee1716bde286e89235c631c2eddaeaef8a338786001c6734a3957e7180702d143e7ea4b8aa073eac9bc420652fca6228f853e5d62

    • SSDEEP

      12288:vD6kK42nuyp6eCYvBSUEVL+NXxpXDpRCd55agxgGtLkhO23F:vD6kCnuO60UULvzpRCd/aQpLkt

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (54) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks