General

  • Target

    download

  • Size

    15KB

  • Sample

    240513-1l5hnsfe49

  • MD5

    a1a7759d79c82e867027571b21b60539

  • SHA1

    cd4783eda2d6d5d3a2407f1722c2a92c794d4d22

  • SHA256

    7478f4fe370ed089df7d5942daba3dcb8112f5e2efd0cf7b687c1cc7b6442bbe

  • SHA512

    940dad356de672039b881b39fe6390fe7dbd93a8a3984301f859e78f898e7ce47988ab55502d5f86b5b9d14169752a6404f402793dfa3ae20eeb16a0bf000a34

  • SSDEEP

    192:PNxyShvK9moqTJkNr423hn2KKPa4TJniqoHx6mAApxYsRHgJtwyARN:yShi9boJkNch7TJniqoHIm/xYsRATYN

Malware Config

Targets

    • Target

      download

    • Size

      15KB

    • MD5

      a1a7759d79c82e867027571b21b60539

    • SHA1

      cd4783eda2d6d5d3a2407f1722c2a92c794d4d22

    • SHA256

      7478f4fe370ed089df7d5942daba3dcb8112f5e2efd0cf7b687c1cc7b6442bbe

    • SHA512

      940dad356de672039b881b39fe6390fe7dbd93a8a3984301f859e78f898e7ce47988ab55502d5f86b5b9d14169752a6404f402793dfa3ae20eeb16a0bf000a34

    • SSDEEP

      192:PNxyShvK9moqTJkNr423hn2KKPa4TJniqoHx6mAApxYsRHgJtwyARN:yShi9boJkNch7TJniqoHIm/xYsRATYN

    • Renames multiple (125) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks