General

  • Target

    43069eba0c142b903970040eba1dfbbf1aa7f3f7bfe2323ccb1d4bea110f93bb

  • Size

    2.0MB

  • Sample

    240319-ybtmbadc69

  • MD5

    4493d22d6ab2b8ff23f1e846ba419354

  • SHA1

    4ce87d5d33ff2417f2105c4f584bf8085ff22084

  • SHA256

    43069eba0c142b903970040eba1dfbbf1aa7f3f7bfe2323ccb1d4bea110f93bb

  • SHA512

    5e6d87860bf1ceec23fe254bad46431829b5a7257015a227644fb143bfc3034cec3d6d83f87d93720cd00b6108b48c686c7279425f06d1c07bf25fb5ec4c1ad1

  • SSDEEP

    24576:tIVpTBPeDnCiUNFvQoWN8SOPVOjqNkByZwIuN+5naYJTVoFfVcrM04ALAW4gtrHi:tIVp1EnhUNM0c+fa+5aY8felj4gd7FA

Malware Config

Targets

    • Target

      43069eba0c142b903970040eba1dfbbf1aa7f3f7bfe2323ccb1d4bea110f93bb

    • Size

      2.0MB

    • MD5

      4493d22d6ab2b8ff23f1e846ba419354

    • SHA1

      4ce87d5d33ff2417f2105c4f584bf8085ff22084

    • SHA256

      43069eba0c142b903970040eba1dfbbf1aa7f3f7bfe2323ccb1d4bea110f93bb

    • SHA512

      5e6d87860bf1ceec23fe254bad46431829b5a7257015a227644fb143bfc3034cec3d6d83f87d93720cd00b6108b48c686c7279425f06d1c07bf25fb5ec4c1ad1

    • SSDEEP

      24576:tIVpTBPeDnCiUNFvQoWN8SOPVOjqNkByZwIuN+5naYJTVoFfVcrM04ALAW4gtrHi:tIVp1EnhUNM0c+fa+5aY8felj4gd7FA

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (64) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks