General

  • Target

    359cfd4003de776b77ed300bc00ada60.exe

  • Size

    480KB

  • Sample

    240102-tk5zgscch2

  • MD5

    359cfd4003de776b77ed300bc00ada60

  • SHA1

    0cdedbcb845c09ae1c04799df13a72c09af9493a

  • SHA256

    4f0a9f168d785270509849e45556f098ffcf2b671acbb24376df5ad9f74b8fb9

  • SHA512

    064d018ac4a1e17f55a843202f7a2631ae9f9e436a7909cda4174d26bafda8d1b56141381de98e4ec23402e402403ee9d98852d6bc3c8517cda730770a57c732

  • SSDEEP

    12288:pdu8vj6MJSSIWH701em9vB/0fgJoq3uu6dsLX1+1w:pdu8j6M46Q1emr0Poj6dsr1ow

Malware Config

Targets

    • Target

      359cfd4003de776b77ed300bc00ada60.exe

    • Size

      480KB

    • MD5

      359cfd4003de776b77ed300bc00ada60

    • SHA1

      0cdedbcb845c09ae1c04799df13a72c09af9493a

    • SHA256

      4f0a9f168d785270509849e45556f098ffcf2b671acbb24376df5ad9f74b8fb9

    • SHA512

      064d018ac4a1e17f55a843202f7a2631ae9f9e436a7909cda4174d26bafda8d1b56141381de98e4ec23402e402403ee9d98852d6bc3c8517cda730770a57c732

    • SSDEEP

      12288:pdu8vj6MJSSIWH701em9vB/0fgJoq3uu6dsLX1+1w:pdu8j6M46Q1emr0Poj6dsr1ow

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (51) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks