General

  • Target

    2024-05-23_a5c6f0537e7a3371b7cf4799e09d710c_bkransomware

  • Size

    71KB

  • Sample

    240523-ecnb5sda46

  • MD5

    a5c6f0537e7a3371b7cf4799e09d710c

  • SHA1

    72f0c2dc4c404774e3fe83c87bbad4fc96283397

  • SHA256

    252d8c1d88c2a702e0b082506f30e603b7fb54bb1081f121aa81e32b49dbd2df

  • SHA512

    70f38764f863c98788e594c81376786011538ea809d2d899876fe12fc07ceb81909f16eca1f31fdddf7db0fba2187184d61c610966c4615b6841dd14320e34f0

  • SSDEEP

    1536:Fc8N7UsWjcd9w+AyabjDbxE+MwmvlzuazTL:ZRpAyazIliazTL

Malware Config

Targets

    • Target

      2024-05-23_a5c6f0537e7a3371b7cf4799e09d710c_bkransomware

    • Size

      71KB

    • MD5

      a5c6f0537e7a3371b7cf4799e09d710c

    • SHA1

      72f0c2dc4c404774e3fe83c87bbad4fc96283397

    • SHA256

      252d8c1d88c2a702e0b082506f30e603b7fb54bb1081f121aa81e32b49dbd2df

    • SHA512

      70f38764f863c98788e594c81376786011538ea809d2d899876fe12fc07ceb81909f16eca1f31fdddf7db0fba2187184d61c610966c4615b6841dd14320e34f0

    • SSDEEP

      1536:Fc8N7UsWjcd9w+AyabjDbxE+MwmvlzuazTL:ZRpAyazIliazTL

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks