General

  • Target

    62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff

  • Size

    208KB

  • Sample

    240521-3x43dsec2x

  • MD5

    67f8bc1f68d349d18faa2188d3cb4b07

  • SHA1

    1a72055a7e2e602b11f7ed53aaaa7231240c89ee

  • SHA256

    62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff

  • SHA512

    ae6a720a7779af57ba3c0fb1b09f6d47a6f9dc8b64390846362627c5c304eccd4956e5d6ee5ca27d85522359c1d37fcc76227e8fb469f2de80802329f9cc8c36

  • SSDEEP

    3072:we+nqymUiOlDoZImEKNsmN1+qONNbbKQkvuasNT+wadrttL9:8qy3iOlDoZxHvJMNfAvuh+wad7L9

Malware Config

Targets

    • Target

      62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff

    • Size

      208KB

    • MD5

      67f8bc1f68d349d18faa2188d3cb4b07

    • SHA1

      1a72055a7e2e602b11f7ed53aaaa7231240c89ee

    • SHA256

      62d49eea4983eccb73a6c9729ee958fc57b786069993a72723cfcaff0e8000ff

    • SHA512

      ae6a720a7779af57ba3c0fb1b09f6d47a6f9dc8b64390846362627c5c304eccd4956e5d6ee5ca27d85522359c1d37fcc76227e8fb469f2de80802329f9cc8c36

    • SSDEEP

      3072:we+nqymUiOlDoZImEKNsmN1+qONNbbKQkvuasNT+wadrttL9:8qy3iOlDoZxHvJMNfAvuh+wad7L9

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (57) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks