General

  • Target

    2024-04-28_9774d1051af0bec3277a17bfb4561c85_bkransomware

  • Size

    302KB

  • Sample

    240428-fddprsgd39

  • MD5

    9774d1051af0bec3277a17bfb4561c85

  • SHA1

    3dac3741c5eb8181ed799e0dc621f95928a3e8c2

  • SHA256

    b8cadf3cc959803f9e3b3493a101051c500371a00d8c116e0226bd6d072b7a4b

  • SHA512

    d553157b77e84be558ad48de2ca6cf6aa15222d6550e01b5772abb682ac1143b64f974bb97938237be4793fe2ac896ed169633bcaa6a65476c93a9e8b9394706

  • SSDEEP

    6144:hZMazqoZM4uelnkHv2N9LYdgf/rkgatYNFHyVlJ1ICS:hS0qoZMYnkH/6fYxOGVlfIZ

Malware Config

Targets

    • Target

      2024-04-28_9774d1051af0bec3277a17bfb4561c85_bkransomware

    • Size

      302KB

    • MD5

      9774d1051af0bec3277a17bfb4561c85

    • SHA1

      3dac3741c5eb8181ed799e0dc621f95928a3e8c2

    • SHA256

      b8cadf3cc959803f9e3b3493a101051c500371a00d8c116e0226bd6d072b7a4b

    • SHA512

      d553157b77e84be558ad48de2ca6cf6aa15222d6550e01b5772abb682ac1143b64f974bb97938237be4793fe2ac896ed169633bcaa6a65476c93a9e8b9394706

    • SSDEEP

      6144:hZMazqoZM4uelnkHv2N9LYdgf/rkgatYNFHyVlJ1ICS:hS0qoZMYnkH/6fYxOGVlfIZ

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks