General

  • Target

    66c1e07a2fff4bc4d05620d9c1bae45b52999b888281798ddd709167002bceb2

  • Size

    640KB

  • Sample

    240523-mxcedadf69

  • MD5

    884bd2294ddbf19195152134c77b3044

  • SHA1

    369afd8c5459bbfca780c92547416c71af31041a

  • SHA256

    66c1e07a2fff4bc4d05620d9c1bae45b52999b888281798ddd709167002bceb2

  • SHA512

    0707b1645de2125753100bb92ea1b195b8a16b0880e5390d038e695c7c801884d6390e84d9a635d11762cfd7ec72f4193b796f072329209668c0d97c1ded3bc1

  • SSDEEP

    12288:SiGxlyhgFUED9bEaHCDZ4lPo1LsCVYQyj9O48u0cNs6MEB:Si6khgFUEDJEaHCDelPopsCVYQyxO48U

Malware Config

Targets

    • Target

      66c1e07a2fff4bc4d05620d9c1bae45b52999b888281798ddd709167002bceb2

    • Size

      640KB

    • MD5

      884bd2294ddbf19195152134c77b3044

    • SHA1

      369afd8c5459bbfca780c92547416c71af31041a

    • SHA256

      66c1e07a2fff4bc4d05620d9c1bae45b52999b888281798ddd709167002bceb2

    • SHA512

      0707b1645de2125753100bb92ea1b195b8a16b0880e5390d038e695c7c801884d6390e84d9a635d11762cfd7ec72f4193b796f072329209668c0d97c1ded3bc1

    • SSDEEP

      12288:SiGxlyhgFUED9bEaHCDZ4lPo1LsCVYQyj9O48u0cNs6MEB:Si6khgFUEDJEaHCDelPopsCVYQyxO48U

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (84) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks