General

  • Target

    2024-04-28_353b5e1da9e9898c161c020964a02398_bkransomware

  • Size

    214KB

  • Sample

    240428-e5y94sgb37

  • MD5

    353b5e1da9e9898c161c020964a02398

  • SHA1

    185029c8792e452cb0dc87f877114d7708716d1b

  • SHA256

    351c7e4f08b76d1b2a54249c670046bb3fe332cba286603ea6c20d1e194bfbed

  • SHA512

    91d85dac114d3356196a33a33b91cf2ae41a84e6fbe59340de131c16f84b5e4ee08fc703cef867fea1988b107bbaa3f7f2badaa062e6ff304fc1d8a40748018a

  • SSDEEP

    3072:ZRpAyazIliazTgvFiPDEtK+WP9HRX2lTfBh8JTUr40aiJ67fleIQswR8vbOd:xZ8azakP/+qB2lrB6N3iJAMT

Malware Config

Targets

    • Target

      2024-04-28_353b5e1da9e9898c161c020964a02398_bkransomware

    • Size

      214KB

    • MD5

      353b5e1da9e9898c161c020964a02398

    • SHA1

      185029c8792e452cb0dc87f877114d7708716d1b

    • SHA256

      351c7e4f08b76d1b2a54249c670046bb3fe332cba286603ea6c20d1e194bfbed

    • SHA512

      91d85dac114d3356196a33a33b91cf2ae41a84e6fbe59340de131c16f84b5e4ee08fc703cef867fea1988b107bbaa3f7f2badaa062e6ff304fc1d8a40748018a

    • SSDEEP

      3072:ZRpAyazIliazTgvFiPDEtK+WP9HRX2lTfBh8JTUr40aiJ67fleIQswR8vbOd:xZ8azakP/+qB2lrB6N3iJAMT

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks