General

  • Target

    2024-04-28_54b817024a4828af6b4dfa37213b62c3_bkransomware

  • Size

    71KB

  • Sample

    240428-3c79babg53

  • MD5

    54b817024a4828af6b4dfa37213b62c3

  • SHA1

    8f610eb699e047f9d68ef0cd1ce349c296f3ad43

  • SHA256

    d1ea8e410b417935ed16a97430ed018d705c113f7a9e192be32b04330c65c2f2

  • SHA512

    d7ddef8eda0fbd7c61f57268758222320fea6741142ff09173e959ccb20e415b25b2f61d159db2d1b125a0680ffebbc0ee742a2cf15a8ed2d9f1e65650cbce48

  • SSDEEP

    1536:Fc8N7UsWjcd9w+AyabjDbxE+MwmvlzuazTBIu:ZRpAyazIliazTOu

Malware Config

Targets

    • Target

      2024-04-28_54b817024a4828af6b4dfa37213b62c3_bkransomware

    • Size

      71KB

    • MD5

      54b817024a4828af6b4dfa37213b62c3

    • SHA1

      8f610eb699e047f9d68ef0cd1ce349c296f3ad43

    • SHA256

      d1ea8e410b417935ed16a97430ed018d705c113f7a9e192be32b04330c65c2f2

    • SHA512

      d7ddef8eda0fbd7c61f57268758222320fea6741142ff09173e959ccb20e415b25b2f61d159db2d1b125a0680ffebbc0ee742a2cf15a8ed2d9f1e65650cbce48

    • SSDEEP

      1536:Fc8N7UsWjcd9w+AyabjDbxE+MwmvlzuazTBIu:ZRpAyazIliazTOu

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks