General

  • Target

    6d9eaafda3c0718ab9aef1d7ef1cb0f98b73368e1c6dd27b41824ecfa5bbb91c

  • Size

    202KB

  • Sample

    240522-2wcq3scb88

  • MD5

    720ed615147892958727c57079e6bf9d

  • SHA1

    07cb92772638f75f34879445d46be0e130c8cc74

  • SHA256

    6d9eaafda3c0718ab9aef1d7ef1cb0f98b73368e1c6dd27b41824ecfa5bbb91c

  • SHA512

    55df8dc9fa34deaa7712bc0e99369346d0819a4dbf50798e98a95557ea387e90f26c3a390f5186367889f902050032d05d70ce92e711eece6ecfd088c164cde5

  • SSDEEP

    3072:VrU4KQ5QalWb4BoCqegjBIjanXaHqRzIVk81FQphkqa/+akXqX7:VYpE2WoCqegjBIjaXzCVqaa87

Malware Config

Targets

    • Target

      6d9eaafda3c0718ab9aef1d7ef1cb0f98b73368e1c6dd27b41824ecfa5bbb91c

    • Size

      202KB

    • MD5

      720ed615147892958727c57079e6bf9d

    • SHA1

      07cb92772638f75f34879445d46be0e130c8cc74

    • SHA256

      6d9eaafda3c0718ab9aef1d7ef1cb0f98b73368e1c6dd27b41824ecfa5bbb91c

    • SHA512

      55df8dc9fa34deaa7712bc0e99369346d0819a4dbf50798e98a95557ea387e90f26c3a390f5186367889f902050032d05d70ce92e711eece6ecfd088c164cde5

    • SSDEEP

      3072:VrU4KQ5QalWb4BoCqegjBIjanXaHqRzIVk81FQphkqa/+akXqX7:VYpE2WoCqegjBIjaXzCVqaa87

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (62) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks