Resubmissions

25-04-2024 23:12

240425-2695bsgb6v 7

25-04-2024 21:45

240425-1l936afd7v 9

25-04-2024 21:44

240425-1lxg3afd6x 3

25-04-2024 21:41

240425-1j6yqafd74 3

General

  • Target

    Screenshot 2024-02-28 175216.png

  • Size

    164KB

  • Sample

    240425-1l936afd7v

  • MD5

    a6d7cf62bae98eb48b65ed4ad422108f

  • SHA1

    eaaf36ee551dcfd693a469483a96de40bf99fa76

  • SHA256

    2a77605bac8278d0b6cd3f8e59516eaa864e89a04e46aaa5e12ffd27926ccbe5

  • SHA512

    62df996b7bc10657df08f0720606d4f3da03d5a0234cb490af819e8d9a7568a06bdb8f27d4450cf32855649ca5043a0bc6a3960d7ff44d456e14b267963166ac

  • SSDEEP

    3072:2APJ4+AtZYqf+HCvb0Obl+o3KSRftX7icc4H2T+omZEyieL32SzeBKszqu2TrR:2AxfsZRGHCgW+o3KSRFX79lHQUGmU+uy

Malware Config

Targets

    • Target

      Screenshot 2024-02-28 175216.png

    • Size

      164KB

    • MD5

      a6d7cf62bae98eb48b65ed4ad422108f

    • SHA1

      eaaf36ee551dcfd693a469483a96de40bf99fa76

    • SHA256

      2a77605bac8278d0b6cd3f8e59516eaa864e89a04e46aaa5e12ffd27926ccbe5

    • SHA512

      62df996b7bc10657df08f0720606d4f3da03d5a0234cb490af819e8d9a7568a06bdb8f27d4450cf32855649ca5043a0bc6a3960d7ff44d456e14b267963166ac

    • SSDEEP

      3072:2APJ4+AtZYqf+HCvb0Obl+o3KSRftX7icc4H2T+omZEyieL32SzeBKszqu2TrR:2AxfsZRGHCgW+o3KSRFX79lHQUGmU+uy

    • Renames multiple (125) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Detected potential entity reuse from brand microsoft.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks