General
-
Target
estadodecuenta332652referenciaembargorentdawwwdiangovco.LHA
-
Size
774KB
-
Sample
240517-seqf6sdc39
-
MD5
0d048bd8c0a6bade3e21d834024001bc
-
SHA1
cfb92fa872a6ac66552d2cc10ebcc7cf3eb59a06
-
SHA256
a9855a152712675a87916aeb25ad5e0c296b251df5c124957cc4cac2f8394f50
-
SHA512
3b4b5efde439f7a8f770a5aeeec8e63eb2a2fbdb8899183b80922093fd6d877022df1732579493318ac0957c9346b1a5a59d1375260acb7389e762f5d100a46e
-
SSDEEP
24576:FEJi2+h5wTfU53A+Kj9uTeawekmcpWtsHKL2:FEj+huTOUuSawIcEuHa2
Static task
static1
Behavioral task
behavioral1
Sample
estadodecuenta332652referenciaembargorentdawwwdiangovco.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
estadodecuenta332652referenciaembargorentdawwwdiangovco.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
estadodecuenta332652referenciaembargorentdawwwdiangovco.exe
-
Size
798KB
-
MD5
4c4dfb410229ae29494d7053d2e05d66
-
SHA1
fb51f3d30ab1780cc93bb47aff9fae4fe92bc0a3
-
SHA256
7b620a850f9af37d6abc81ef1a7a72da6b8ca2d696b9a83ebe8e4b8f99a77f23
-
SHA512
cc5fde78dc8cb6032046e7fb302a561eda90e7dac1532f63d41e8efcf8c7cb077bb3da35e9755ac19da7a8cbe90a4a592a491bd49657f80288fb5ff071841029
-
SSDEEP
24576:OxsgdEeOsRu/W+VRm0/CnUPjVwKHb94YMFniyyA:OxTdZOsRu/m6AUPCKHRMFnyA
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Modifies security service
-
Quasar payload
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1