General

  • Target

    581799237e8f5c3cecfedfb6b8aaeb7a

  • Size

    484KB

  • Sample

    231226-glht5acdbr

  • MD5

    581799237e8f5c3cecfedfb6b8aaeb7a

  • SHA1

    2964ab933b7bf2c7a04ce2fcbc4b7820431c699a

  • SHA256

    559741c9738226c2573fa4188a1a465563926b28d885f80e6507fee91bde626e

  • SHA512

    aeb02472d44741ae40bd0bbb0b54525c76ec54a9d49813684adf1dde60b80d5c9c0214230d5f722761ca1ad0425ba967190fa5c23b520a189a63f617bd40928f

  • SSDEEP

    6144:byEjM5jcA3YDMThyH4JXkUGzekBdxacADVsS3dT/Y5sYl2i69h88HoihJEmYQUmv:byEjMvIIBtYLdsDVVJqkJbrvh/+g

Malware Config

Targets

    • Target

      581799237e8f5c3cecfedfb6b8aaeb7a

    • Size

      484KB

    • MD5

      581799237e8f5c3cecfedfb6b8aaeb7a

    • SHA1

      2964ab933b7bf2c7a04ce2fcbc4b7820431c699a

    • SHA256

      559741c9738226c2573fa4188a1a465563926b28d885f80e6507fee91bde626e

    • SHA512

      aeb02472d44741ae40bd0bbb0b54525c76ec54a9d49813684adf1dde60b80d5c9c0214230d5f722761ca1ad0425ba967190fa5c23b520a189a63f617bd40928f

    • SSDEEP

      6144:byEjM5jcA3YDMThyH4JXkUGzekBdxacADVsS3dT/Y5sYl2i69h88HoihJEmYQUmv:byEjMvIIBtYLdsDVVJqkJbrvh/+g

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (51) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks