General

  • Target

    2024-04-27_b197c3c762a8b11ba182071340378d71_bkransomware

  • Size

    71KB

  • Sample

    240427-2lgmaaab74

  • MD5

    b197c3c762a8b11ba182071340378d71

  • SHA1

    a124838a410d13989b415c719b317c2d7f266388

  • SHA256

    3d1eb961c24b0e72d0be10ecf3626439529b0be7e3bc86fc8f5c0a179521e0b4

  • SHA512

    8237c54b2dd69b92b5a65a4a9adc3e85cab7dfeda76b3a1fb0531d0809d54521409d61d22797fc20bcce1b0e57c541248ac3f2ed96aaba267fffe5762bac51da

  • SSDEEP

    1536:Fc8N7UsWjcd9w+AyabjDbxE+MwmvlzuazTS:ZRpAyazIliazTS

Malware Config

Targets

    • Target

      2024-04-27_b197c3c762a8b11ba182071340378d71_bkransomware

    • Size

      71KB

    • MD5

      b197c3c762a8b11ba182071340378d71

    • SHA1

      a124838a410d13989b415c719b317c2d7f266388

    • SHA256

      3d1eb961c24b0e72d0be10ecf3626439529b0be7e3bc86fc8f5c0a179521e0b4

    • SHA512

      8237c54b2dd69b92b5a65a4a9adc3e85cab7dfeda76b3a1fb0531d0809d54521409d61d22797fc20bcce1b0e57c541248ac3f2ed96aaba267fffe5762bac51da

    • SSDEEP

      1536:Fc8N7UsWjcd9w+AyabjDbxE+MwmvlzuazTS:ZRpAyazIliazTS

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks