General

  • Target

    python-3.8.4-amd64.exe

  • Size

    26.6MB

  • Sample

    240213-3ll3fada97

  • MD5

    12297fb08088d1002f7e93a93fd779c6

  • SHA1

    b1f2c7d5a1f7964d880ede1f9dea615f50e99dbc

  • SHA256

    24cead226c8b3de579e246aa4152bd6c2ff8a613a65998eac8b66920d9821919

  • SHA512

    287395b90a4f0db8f1a77bf20033f3737a967b96dc118bb99d36e91a6c63e4f8f843ae920c32621579a8c748be1880ab000e82b9fd20b757ee8728df2bd8f387

  • SSDEEP

    786432:+m3cSfEYkrh+q4qKZ72rpFIInsesI3zzVKod61:b37sJ+qWZ72rzIXhl1

Malware Config

Targets

    • Target

      python-3.8.4-amd64.exe

    • Size

      26.6MB

    • MD5

      12297fb08088d1002f7e93a93fd779c6

    • SHA1

      b1f2c7d5a1f7964d880ede1f9dea615f50e99dbc

    • SHA256

      24cead226c8b3de579e246aa4152bd6c2ff8a613a65998eac8b66920d9821919

    • SHA512

      287395b90a4f0db8f1a77bf20033f3737a967b96dc118bb99d36e91a6c63e4f8f843ae920c32621579a8c748be1880ab000e82b9fd20b757ee8728df2bd8f387

    • SSDEEP

      786432:+m3cSfEYkrh+q4qKZ72rpFIInsesI3zzVKod61:b37sJ+qWZ72rzIXhl1

    • Renames multiple (109) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks whether UAC is enabled

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks