General

  • Target

    7ab153dd8625a17d72a2a064ae4ae0d7

  • Size

    444KB

  • Sample

    231226-tdkd7sffaj

  • MD5

    7ab153dd8625a17d72a2a064ae4ae0d7

  • SHA1

    266d264def8bacc8650dc786aa33e1badf2a5a7c

  • SHA256

    b192ae6403671309e50c0b1f7bbe0eb232890debe7db2227c1d9b942c0a4c4b2

  • SHA512

    11691795e76a4eb4d939420ca33cd25031a24abce299bc7c32d0a5909163233874ea7fce551843e115a6dd73e65162a843c24ae7e61006ba27453aa3e343022a

  • SSDEEP

    12288:pcI0dNtbBZAHlEcNz+tltwqyE0kxrF48Ds7dGiiTLdtYRYDxwN7g+9JpuLCz:sbB+z+1wnE/sgiiVtzxy7g4fuWz

Malware Config

Targets

    • Target

      7ab153dd8625a17d72a2a064ae4ae0d7

    • Size

      444KB

    • MD5

      7ab153dd8625a17d72a2a064ae4ae0d7

    • SHA1

      266d264def8bacc8650dc786aa33e1badf2a5a7c

    • SHA256

      b192ae6403671309e50c0b1f7bbe0eb232890debe7db2227c1d9b942c0a4c4b2

    • SHA512

      11691795e76a4eb4d939420ca33cd25031a24abce299bc7c32d0a5909163233874ea7fce551843e115a6dd73e65162a843c24ae7e61006ba27453aa3e343022a

    • SSDEEP

      12288:pcI0dNtbBZAHlEcNz+tltwqyE0kxrF48Ds7dGiiTLdtYRYDxwN7g+9JpuLCz:sbB+z+1wnE/sgiiVtzxy7g4fuWz

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (51) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks