General

  • Target

    JigsawRansomware.exe

  • Size

    1.5MB

  • Sample

    240326-bbr26abb38

  • MD5

    1ad1af91d930a0e6d06bc7d75862b22c

  • SHA1

    636517ce9dad526e1c69fe365d6c2a0da94a51a7

  • SHA256

    d4a11d4ae09a5ba61ef7a924f6137e8ae75749ee70d09ffd68eb6c8fb89c0725

  • SHA512

    8afe920c7b990de33a22c0b33fe49f366453636e98f9948e5d1b3e7dc6d170bc405031bef0d225fdc1448a2f6d83dfdd8e689b4202e234292402396588d714e3

  • SSDEEP

    49152:K70nS4pfVkqgy6r3a+kqXfd+/9A9TVanieKdO:K7K5JEyUa+kqXf0FoVW

Malware Config

Targets

    • Target

      JigsawRansomware.exe

    • Size

      1.5MB

    • MD5

      1ad1af91d930a0e6d06bc7d75862b22c

    • SHA1

      636517ce9dad526e1c69fe365d6c2a0da94a51a7

    • SHA256

      d4a11d4ae09a5ba61ef7a924f6137e8ae75749ee70d09ffd68eb6c8fb89c0725

    • SHA512

      8afe920c7b990de33a22c0b33fe49f366453636e98f9948e5d1b3e7dc6d170bc405031bef0d225fdc1448a2f6d83dfdd8e689b4202e234292402396588d714e3

    • SSDEEP

      49152:K70nS4pfVkqgy6r3a+kqXfd+/9A9TVanieKdO:K7K5JEyUa+kqXf0FoVW

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Jigsaw Ransomware

      Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.

    • AgentTesla payload

    • Renames multiple (3732) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks