Resubmissions

02-02-2024 15:39

240202-s3kwlabgeq 10

02-02-2024 08:43

240202-kmlh7aaad9 10

General

  • Target

    8910b2027972c981e85da40f9869b5c2

  • Size

    61KB

  • Sample

    240202-s3kwlabgeq

  • MD5

    8910b2027972c981e85da40f9869b5c2

  • SHA1

    db400e592c40874f66a12b19d8e5a04ec3edf424

  • SHA256

    fa2c56fde9e9006a859c409ed90594d4422bebf9eccc64fd70ac296eea2e47ac

  • SHA512

    9895ce3f1456cd2825a81046ce8d9072e1db2df7d5d5f44ee3452e3de4be60961b1d0150ea1236dd17fd9886638666a0a7550121c940dd3b8285c605e29a0f2a

  • SSDEEP

    768:TKsMqCXfVcWeHM9ZkiANIU/jYLDwUzc80gmq3oP/oDv:TKseKM9ZkiAP0r/0O8/oz

Malware Config

Targets

    • Target

      8910b2027972c981e85da40f9869b5c2

    • Size

      61KB

    • MD5

      8910b2027972c981e85da40f9869b5c2

    • SHA1

      db400e592c40874f66a12b19d8e5a04ec3edf424

    • SHA256

      fa2c56fde9e9006a859c409ed90594d4422bebf9eccc64fd70ac296eea2e47ac

    • SHA512

      9895ce3f1456cd2825a81046ce8d9072e1db2df7d5d5f44ee3452e3de4be60961b1d0150ea1236dd17fd9886638666a0a7550121c940dd3b8285c605e29a0f2a

    • SSDEEP

      768:TKsMqCXfVcWeHM9ZkiANIU/jYLDwUzc80gmq3oP/oDv:TKseKM9ZkiAP0r/0O8/oz

    • Nitro

      A ransomware that demands Discord nitro gift codes to decrypt files.

    • Renames multiple (93) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks