General

  • Target

    ce37b74af22ddecdb58aea20bd8675d08137cb8811b14a6e7b6dded78205caf7

  • Size

    111KB

  • Sample

    240328-akmy5ahd54

  • MD5

    316085298f678b91062c263f97b0437e

  • SHA1

    6c42731c47eef76ab021fa94b398d8e476018ac3

  • SHA256

    ce37b74af22ddecdb58aea20bd8675d08137cb8811b14a6e7b6dded78205caf7

  • SHA512

    ff9924c87a85452f3fc049c9fe4812e0c09575765beb75b9c842264856da64aef86d14c81a8cf716921fbaa2b675a7bcda0cb145e539c9fee6a34291ed6dfce4

  • SSDEEP

    3072:H03Xm4R+wBCq2O9QQJkbLcQ7xtkCLtiQ8:odR+0D2OmuucQ7os8/

Malware Config

Targets

    • Target

      ce37b74af22ddecdb58aea20bd8675d08137cb8811b14a6e7b6dded78205caf7

    • Size

      111KB

    • MD5

      316085298f678b91062c263f97b0437e

    • SHA1

      6c42731c47eef76ab021fa94b398d8e476018ac3

    • SHA256

      ce37b74af22ddecdb58aea20bd8675d08137cb8811b14a6e7b6dded78205caf7

    • SHA512

      ff9924c87a85452f3fc049c9fe4812e0c09575765beb75b9c842264856da64aef86d14c81a8cf716921fbaa2b675a7bcda0cb145e539c9fee6a34291ed6dfce4

    • SSDEEP

      3072:H03Xm4R+wBCq2O9QQJkbLcQ7xtkCLtiQ8:odR+0D2OmuucQ7os8/

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (77) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks