General

  • Target

    5c3f21d902779abc5a23da2d8fb76c10989c8fa359636d669957058842cf1de7

  • Size

    853KB

  • Sample

    240310-1bhwxscb84

  • MD5

    4bfcb1e6f04b3c75798656815d10010c

  • SHA1

    ce3ce22dd1cbe2b006333ea997d975ebb89af57b

  • SHA256

    5c3f21d902779abc5a23da2d8fb76c10989c8fa359636d669957058842cf1de7

  • SHA512

    98e07eb719868b0abe934a76b3a21c7afa1fe754ddf8ad7aee6230d4a60b934d9da0c357662127275b74daf50a447f32eeee69d7318fabd6f884f15b533c3730

  • SSDEEP

    24576:veMHeMoocASchetKKMfpKessJK4tepz3ygWP6:vev9dvKKaRxJxtep7S

Malware Config

Targets

    • Target

      5c3f21d902779abc5a23da2d8fb76c10989c8fa359636d669957058842cf1de7

    • Size

      853KB

    • MD5

      4bfcb1e6f04b3c75798656815d10010c

    • SHA1

      ce3ce22dd1cbe2b006333ea997d975ebb89af57b

    • SHA256

      5c3f21d902779abc5a23da2d8fb76c10989c8fa359636d669957058842cf1de7

    • SHA512

      98e07eb719868b0abe934a76b3a21c7afa1fe754ddf8ad7aee6230d4a60b934d9da0c357662127275b74daf50a447f32eeee69d7318fabd6f884f15b533c3730

    • SSDEEP

      24576:veMHeMoocASchetKKMfpKessJK4tepz3ygWP6:vev9dvKKaRxJxtep7S

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (84) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks