General

  • Target

    eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea

  • Size

    199KB

  • Sample

    240522-lmc3gsag72

  • MD5

    15777ca5795c1fda5dd42a1c496276cf

  • SHA1

    c678051bbbce4f3f5c51bf7be1f3f0b55d5bf6a5

  • SHA256

    eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea

  • SHA512

    0bca1ea50e2c11ddb69b1c6d6af6bd14e45ba8ddb9e7f63322508cdc4495ba72e692bfa627a75dc4ff40df36ae96eede2438edda056a9e8df5eb041eb4238390

  • SSDEEP

    3072:8pI0BOF3oO0fbttcHbYswnGxmgV/kEIaPkzdOYfebP8QZA2nz7:8q0BOFUfrc7YnMmgV/XFy4SQZlnz7

Malware Config

Targets

    • Target

      eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea

    • Size

      199KB

    • MD5

      15777ca5795c1fda5dd42a1c496276cf

    • SHA1

      c678051bbbce4f3f5c51bf7be1f3f0b55d5bf6a5

    • SHA256

      eb64846fe80f6527d4ddde4478ed85f392b859ce592fcc21452cc9b429a381ea

    • SHA512

      0bca1ea50e2c11ddb69b1c6d6af6bd14e45ba8ddb9e7f63322508cdc4495ba72e692bfa627a75dc4ff40df36ae96eede2438edda056a9e8df5eb041eb4238390

    • SSDEEP

      3072:8pI0BOF3oO0fbttcHbYswnGxmgV/kEIaPkzdOYfebP8QZA2nz7:8q0BOFUfrc7YnMmgV/XFy4SQZlnz7

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (78) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks