General

  • Target

    0921add95609d77f0c6195b2bec474b693ec217abb1db496f367c768bfbe7cca

  • Size

    1.1MB

  • Sample

    240130-gemjqsahhq

  • MD5

    a362de111d5dff6bcdeaf4717af268b6

  • SHA1

    2e5104db35871c5bc7da2035d8b91398bb5d5e0e

  • SHA256

    0921add95609d77f0c6195b2bec474b693ec217abb1db496f367c768bfbe7cca

  • SHA512

    b48a18158a0dff9a9012952c467fcf69b8bfc53ceeacaf32a90fc4b7f3afd34465e676b282fa87f3c5c85b4780baf96cc754dcdeef77ba5330fa8c4fd1d20b72

  • SSDEEP

    12288:w6yilXxt+i9uJB5XladYq15U+F54Sy3JItYzpm+zF4KSlgNY/k09L4:byKtb9gXdqjF54/JuOplFB09

Malware Config

Targets

    • Target

      0921add95609d77f0c6195b2bec474b693ec217abb1db496f367c768bfbe7cca

    • Size

      1.1MB

    • MD5

      a362de111d5dff6bcdeaf4717af268b6

    • SHA1

      2e5104db35871c5bc7da2035d8b91398bb5d5e0e

    • SHA256

      0921add95609d77f0c6195b2bec474b693ec217abb1db496f367c768bfbe7cca

    • SHA512

      b48a18158a0dff9a9012952c467fcf69b8bfc53ceeacaf32a90fc4b7f3afd34465e676b282fa87f3c5c85b4780baf96cc754dcdeef77ba5330fa8c4fd1d20b72

    • SSDEEP

      12288:w6yilXxt+i9uJB5XladYq15U+F54Sy3JItYzpm+zF4KSlgNY/k09L4:byKtb9gXdqjF54/JuOplFB09

    • Jigsaw Ransomware

      Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.

    • Renames multiple (2002) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks