General

  • Target

    dcace98774f0ecdb3d35e193055302a747c47325bf6c4c0a4eb193b902e21a78

  • Size

    302KB

  • Sample

    240504-ed5mtacd9y

  • MD5

    00ed6e1c89d5bf51c1ab789af9f0191e

  • SHA1

    525cbaa02150997a11354875160cec63ba3d2fb2

  • SHA256

    dcace98774f0ecdb3d35e193055302a747c47325bf6c4c0a4eb193b902e21a78

  • SHA512

    4f498829e5ff9d763c78c5da778181f5ca88263dd04fe85aab3e3db522db3714875b0674411c2b2f7d2bab9db0f7231a4a0766d5850c4e1222d878c1e9155dab

  • SSDEEP

    6144:Ql4VZmEeuOOlXFk+3udfkZMjGbfWTwanQsxOvHsbOlpzfH1HTW:BVZmuOOXk+3bBG5P8p/1zW

Malware Config

Targets

    • Target

      dcace98774f0ecdb3d35e193055302a747c47325bf6c4c0a4eb193b902e21a78

    • Size

      302KB

    • MD5

      00ed6e1c89d5bf51c1ab789af9f0191e

    • SHA1

      525cbaa02150997a11354875160cec63ba3d2fb2

    • SHA256

      dcace98774f0ecdb3d35e193055302a747c47325bf6c4c0a4eb193b902e21a78

    • SHA512

      4f498829e5ff9d763c78c5da778181f5ca88263dd04fe85aab3e3db522db3714875b0674411c2b2f7d2bab9db0f7231a4a0766d5850c4e1222d878c1e9155dab

    • SSDEEP

      6144:Ql4VZmEeuOOlXFk+3udfkZMjGbfWTwanQsxOvHsbOlpzfH1HTW:BVZmuOOXk+3bBG5P8p/1zW

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (58) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks