General

  • Target

    75c4fc13ccab82592f9f95f8e6a79a8592a4fabf4f0e2330a7ce6c17dadfe66a

  • Size

    564KB

  • Sample

    240424-v48edsea38

  • MD5

    3e74cf5997b39527cb1ab35f46cc87be

  • SHA1

    43d2bfc0999ef4db94a41c97d1f4de77bc3f1684

  • SHA256

    75c4fc13ccab82592f9f95f8e6a79a8592a4fabf4f0e2330a7ce6c17dadfe66a

  • SHA512

    c47c5a24e2366743bf20e21d0cd5bc030407e8fe9d09e8f4e281e292deafd40ead5d0c4017d9f52db98c7813ea5ff69497aa148ffbe4bf55d382834940ead4b2

  • SSDEEP

    12288:sSdnniJxxrexZovq422UiWHkec18l1rppnqc/:DniJjrexZovq4K1Lc1k7j/

Malware Config

Targets

    • Target

      75c4fc13ccab82592f9f95f8e6a79a8592a4fabf4f0e2330a7ce6c17dadfe66a

    • Size

      564KB

    • MD5

      3e74cf5997b39527cb1ab35f46cc87be

    • SHA1

      43d2bfc0999ef4db94a41c97d1f4de77bc3f1684

    • SHA256

      75c4fc13ccab82592f9f95f8e6a79a8592a4fabf4f0e2330a7ce6c17dadfe66a

    • SHA512

      c47c5a24e2366743bf20e21d0cd5bc030407e8fe9d09e8f4e281e292deafd40ead5d0c4017d9f52db98c7813ea5ff69497aa148ffbe4bf55d382834940ead4b2

    • SSDEEP

      12288:sSdnniJxxrexZovq422UiWHkec18l1rppnqc/:DniJjrexZovq4K1Lc1k7j/

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (85) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks