General

  • Target

    39f8fe85b41c745e4082594c64e17d26178f583f7a6f86f546892435552c43cb

  • Size

    266KB

  • Sample

    240523-y7jf8afa8s

  • MD5

    a9096d488f4a78e2f295705012f513b6

  • SHA1

    2ae533414c1a6a5e4a92c0b86f2b8359c90d0e84

  • SHA256

    39f8fe85b41c745e4082594c64e17d26178f583f7a6f86f546892435552c43cb

  • SHA512

    08cc71d4209f69e3a3b60cf7da2136f48fad041a3c59c6007a4e7e566c13e4b9e99c8183ceb915b4b0812177e2b45e7b8a4239a5d294016e4fa08e6abee0dea3

  • SSDEEP

    6144:PutR5Pdf+Ish3vlEnuUD/CZtUCOH+rY3i7s1:PKRZZ+Isv0PkOHri6

Malware Config

Targets

    • Target

      39f8fe85b41c745e4082594c64e17d26178f583f7a6f86f546892435552c43cb

    • Size

      266KB

    • MD5

      a9096d488f4a78e2f295705012f513b6

    • SHA1

      2ae533414c1a6a5e4a92c0b86f2b8359c90d0e84

    • SHA256

      39f8fe85b41c745e4082594c64e17d26178f583f7a6f86f546892435552c43cb

    • SHA512

      08cc71d4209f69e3a3b60cf7da2136f48fad041a3c59c6007a4e7e566c13e4b9e99c8183ceb915b4b0812177e2b45e7b8a4239a5d294016e4fa08e6abee0dea3

    • SSDEEP

      6144:PutR5Pdf+Ish3vlEnuUD/CZtUCOH+rY3i7s1:PKRZZ+Isv0PkOHri6

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (58) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Modify Registry

4
T1112

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks