General

  • Target

    89ac9795894e0e1c2454a8d870b56d36

  • Size

    488KB

  • Sample

    240202-q5clwshggk

  • MD5

    89ac9795894e0e1c2454a8d870b56d36

  • SHA1

    7ca83f52c155a6046494522368cf67f8b60f892c

  • SHA256

    64b4fc9300c085830c8dff772102f6581aec25fcc872082644913fddb174d2eb

  • SHA512

    5929d5bb07dbd5388b8c4d4457629ac931421b9fde8817b6b84123817da7648966b800cccb20d76bd1aa4d0e4d17b2fca88a289bde1d4498d86ea7279233caf9

  • SSDEEP

    6144:gjE3rptoswoMg7XSvvL0yGUuLij4AVdVYY/DAiy2OnG/Tg548r52dltD8ZX19KI1:q0rXRwocc+L7DAiyT6IM981GhFA

Malware Config

Targets

    • Target

      89ac9795894e0e1c2454a8d870b56d36

    • Size

      488KB

    • MD5

      89ac9795894e0e1c2454a8d870b56d36

    • SHA1

      7ca83f52c155a6046494522368cf67f8b60f892c

    • SHA256

      64b4fc9300c085830c8dff772102f6581aec25fcc872082644913fddb174d2eb

    • SHA512

      5929d5bb07dbd5388b8c4d4457629ac931421b9fde8817b6b84123817da7648966b800cccb20d76bd1aa4d0e4d17b2fca88a289bde1d4498d86ea7279233caf9

    • SSDEEP

      6144:gjE3rptoswoMg7XSvvL0yGUuLij4AVdVYY/DAiy2OnG/Tg548r52dltD8ZX19KI1:q0rXRwocc+L7DAiyT6IM981GhFA

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (75) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks