General

  • Target

    1c24af34de95be7460daa1f9b675c35a.exe

  • Size

    940KB

  • Sample

    240426-gzw9nsae8w

  • MD5

    1c24af34de95be7460daa1f9b675c35a

  • SHA1

    b7c19a25874210adbfe8ecb44984abe12aab1129

  • SHA256

    2d7d6537479e176d58e438642b00b73ee938a19e8eb9296a400e4b1741582702

  • SHA512

    241167eafb00a79497bea745089060a81cc3b1076f06927bc659f3eacc63c1bb3baa5ff0f14599d2d40fedcdcb97a35ecd3cb35b077a53cb9ad3cb20bf6bdffd

  • SSDEEP

    12288:9OKpnF6Ee+Rp4tqkWjQ+iOklku0/04gNphgBBO75nONT3vx2zVP:9OqZe0p4Ek4niOkl/A04szE87JKTvm

Malware Config

Targets

    • Target

      1c24af34de95be7460daa1f9b675c35a.exe

    • Size

      940KB

    • MD5

      1c24af34de95be7460daa1f9b675c35a

    • SHA1

      b7c19a25874210adbfe8ecb44984abe12aab1129

    • SHA256

      2d7d6537479e176d58e438642b00b73ee938a19e8eb9296a400e4b1741582702

    • SHA512

      241167eafb00a79497bea745089060a81cc3b1076f06927bc659f3eacc63c1bb3baa5ff0f14599d2d40fedcdcb97a35ecd3cb35b077a53cb9ad3cb20bf6bdffd

    • SSDEEP

      12288:9OKpnF6Ee+Rp4tqkWjQ+iOklku0/04gNphgBBO75nONT3vx2zVP:9OqZe0p4Ek4niOkl/A04szE87JKTvm

    • Renames multiple (176) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks