General

  • Target

    794d4380bd0d093d7c3b317478f5e872

  • Size

    484KB

  • Sample

    231226-sz77qaeha8

  • MD5

    794d4380bd0d093d7c3b317478f5e872

  • SHA1

    8383dfac5ac2223c13259728214c4b515565698b

  • SHA256

    744edf6d7b107932f18585086ecab520b2e8b766edb6ed0f795f09fd2958df64

  • SHA512

    42f7ef72c5bf13299e7c0cfcb2bd62f40dca04ff68a34cabf51ee4ffb47d88fdda1e0f48f4b85ded0e236b710ed7124782bce9a6a90b06f8cb6edb732938374e

  • SSDEEP

    12288:w8ApY98WkVuhcYKgDE5qP0PwZJe2uuYkEWErBv5meGGbvyafe7h:53ivoKgoq8PwZJe2uuREWEpIOfi

Malware Config

Targets

    • Target

      794d4380bd0d093d7c3b317478f5e872

    • Size

      484KB

    • MD5

      794d4380bd0d093d7c3b317478f5e872

    • SHA1

      8383dfac5ac2223c13259728214c4b515565698b

    • SHA256

      744edf6d7b107932f18585086ecab520b2e8b766edb6ed0f795f09fd2958df64

    • SHA512

      42f7ef72c5bf13299e7c0cfcb2bd62f40dca04ff68a34cabf51ee4ffb47d88fdda1e0f48f4b85ded0e236b710ed7124782bce9a6a90b06f8cb6edb732938374e

    • SSDEEP

      12288:w8ApY98WkVuhcYKgDE5qP0PwZJe2uuYkEWErBv5meGGbvyafe7h:53ivoKgoq8PwZJe2uuREWEpIOfi

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (63) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks