General

  • Target

    e30022d7e001f1c70299bf7cc788b199b895b0148d1153850aef16c38d5ea5e3.sample

  • Size

    205KB

  • Sample

    240227-wljhzsff65

  • MD5

    7e32ecc8c8dbd2c9cf7b516c6e5ba0f5

  • SHA1

    2730d4f05c06feadd41adade659eca234efd23d1

  • SHA256

    e30022d7e001f1c70299bf7cc788b199b895b0148d1153850aef16c38d5ea5e3

  • SHA512

    683e4a24f4053508f54283f361397417e844f58b1546c28b3bf7689c08c81e0285d27aa6f1399855abf750bb1ebef8138d4de01ddf5233e3af0a6fd642737f80

  • SSDEEP

    3072:JPgv1uTga8za7/aApO6fCR6kMgNjTX8jI8VD/dJJO04aN5uvvmRE7xIxT62Br09c:xKZTMPVDdzR1N5sAxBN9UDRWRd

Malware Config

Targets

    • Target

      e30022d7e001f1c70299bf7cc788b199b895b0148d1153850aef16c38d5ea5e3.sample

    • Size

      205KB

    • MD5

      7e32ecc8c8dbd2c9cf7b516c6e5ba0f5

    • SHA1

      2730d4f05c06feadd41adade659eca234efd23d1

    • SHA256

      e30022d7e001f1c70299bf7cc788b199b895b0148d1153850aef16c38d5ea5e3

    • SHA512

      683e4a24f4053508f54283f361397417e844f58b1546c28b3bf7689c08c81e0285d27aa6f1399855abf750bb1ebef8138d4de01ddf5233e3af0a6fd642737f80

    • SSDEEP

      3072:JPgv1uTga8za7/aApO6fCR6kMgNjTX8jI8VD/dJJO04aN5uvvmRE7xIxT62Br09c:xKZTMPVDdzR1N5sAxBN9UDRWRd

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (9317) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks