General

  • Target

    4d6d7bd80904ee7156b2387a41fde05213464bc1d1fb63aaa916d6d8ab6987a0

  • Size

    192KB

  • Sample

    240522-1blb2shd5y

  • MD5

    ca410ca541169778dee47092d3ccd5cc

  • SHA1

    bfb1ad6ccb5c277aca1e65595d667eed13d872f4

  • SHA256

    4d6d7bd80904ee7156b2387a41fde05213464bc1d1fb63aaa916d6d8ab6987a0

  • SHA512

    36b1c31cd04357861b08adf0222edf9cb61414c896c7b3591140e37805e0c518591c16eb3286889834add2f70e6debc3ee7b4eb468134d97dd7e30cabcb1d127

  • SSDEEP

    3072:AF6uClzsQQnFo/aeuUHmn40eNiHPNgm6YnYmuAwS655e:XhsVkWn4DN8QS65

Malware Config

Targets

    • Target

      4d6d7bd80904ee7156b2387a41fde05213464bc1d1fb63aaa916d6d8ab6987a0

    • Size

      192KB

    • MD5

      ca410ca541169778dee47092d3ccd5cc

    • SHA1

      bfb1ad6ccb5c277aca1e65595d667eed13d872f4

    • SHA256

      4d6d7bd80904ee7156b2387a41fde05213464bc1d1fb63aaa916d6d8ab6987a0

    • SHA512

      36b1c31cd04357861b08adf0222edf9cb61414c896c7b3591140e37805e0c518591c16eb3286889834add2f70e6debc3ee7b4eb468134d97dd7e30cabcb1d127

    • SSDEEP

      3072:AF6uClzsQQnFo/aeuUHmn40eNiHPNgm6YnYmuAwS655e:XhsVkWn4DN8QS65

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (58) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks