General

  • Target

    046e293a96a0786824207b27b9183b20cae7f62236a49d9733ae29e16a15be82

  • Size

    320KB

  • Sample

    240522-xnpcpada27

  • MD5

    a27479073887ba737a2931cb1f3594a0

  • SHA1

    038a39b24ffc5f5e9677bb974129961300431dca

  • SHA256

    046e293a96a0786824207b27b9183b20cae7f62236a49d9733ae29e16a15be82

  • SHA512

    9a5bdbfb1808d8da888022e3cb24f3a6f52f1bddd77641f6c5bb77481ea1d520a363018b1fa1a89dbdd0f4194118459df71df0d278b91e2bc8a2718f0ed9c8a3

  • SSDEEP

    6144:OnkueEHjTX/Rq5xOaAJZ2oExEONSu6VKaQQ0HwjnTzlvrx:OLTH8AzHEx2u6VKaQHwXzlz

Malware Config

Targets

    • Target

      046e293a96a0786824207b27b9183b20cae7f62236a49d9733ae29e16a15be82

    • Size

      320KB

    • MD5

      a27479073887ba737a2931cb1f3594a0

    • SHA1

      038a39b24ffc5f5e9677bb974129961300431dca

    • SHA256

      046e293a96a0786824207b27b9183b20cae7f62236a49d9733ae29e16a15be82

    • SHA512

      9a5bdbfb1808d8da888022e3cb24f3a6f52f1bddd77641f6c5bb77481ea1d520a363018b1fa1a89dbdd0f4194118459df71df0d278b91e2bc8a2718f0ed9c8a3

    • SSDEEP

      6144:OnkueEHjTX/Rq5xOaAJZ2oExEONSu6VKaQQ0HwjnTzlvrx:OLTH8AzHEx2u6VKaQHwXzlz

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (56) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks