Resubmissions

10-01-2024 13:21

240110-qlvy5ahag4 10

10-01-2024 12:17

240110-pf835afbdr 10

General

  • Target

    a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455

  • Size

    3.2MB

  • Sample

    240110-pf835afbdr

  • MD5

    6d44f8f3c1608e5958b40f9c6d7b6718

  • SHA1

    9203ad3b6ffb7732591ef560965566555bce9d82

  • SHA256

    a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455

  • SHA512

    656eb44b563705e1045b6a881b4f8a462ecf3bb8b2421cb18dfa21421629f7af92fe4b72736edfe3fea2ea13bef84f5faab5a78b8ef2b4f656a9055d0c4a22bd

  • SSDEEP

    98304:wgwRevguPPFpugyxQkvA51nFbk+kUwWlGroD+1f:wgtv7ov5vqbk++AGkD+1f

Malware Config

Targets

    • Target

      a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455

    • Size

      3.2MB

    • MD5

      6d44f8f3c1608e5958b40f9c6d7b6718

    • SHA1

      9203ad3b6ffb7732591ef560965566555bce9d82

    • SHA256

      a8759b39cecf17631e9d4952aecd32ce233e01d08841178e7ef81f3afdd8e455

    • SHA512

      656eb44b563705e1045b6a881b4f8a462ecf3bb8b2421cb18dfa21421629f7af92fe4b72736edfe3fea2ea13bef84f5faab5a78b8ef2b4f656a9055d0c4a22bd

    • SSDEEP

      98304:wgwRevguPPFpugyxQkvA51nFbk+kUwWlGroD+1f:wgtv7ov5vqbk++AGkD+1f

    • Detects Mimic ransomware

    • Mimic

      Ransomware family was first exploited in the wild in 2022.

    • Modifies security service

    • UAC bypass

    • Clears Windows event logs

    • Modifies boot configuration data using bcdedit

    • Renames multiple (6297) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Deletes System State backups

      Uses wbadmin.exe to inhibit system recovery.

    • Sets file execution options in registry

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks