General

  • Target

    34178dfacf04efb4c8414857aaa61e33116d393386bc91d3d1eab2863d63fdce

  • Size

    311KB

  • Sample

    240523-yyagyseg45

  • MD5

    54125454268caa329847e779814292f7

  • SHA1

    923b57be07dac538ab63e3d9fcd25c0f0a29e3ba

  • SHA256

    34178dfacf04efb4c8414857aaa61e33116d393386bc91d3d1eab2863d63fdce

  • SHA512

    75b85796c69d3774576eab6a5654127d3e14ec48e41dc693e642198ba60bc1930a0ab159b28a392c940e4b9c4739447f7c23bfcf1628d6ca7ccffe010be919a0

  • SSDEEP

    6144:8pwicXX/zS1FXDEMuvM86lK5bHWJdsiP0Hu7VBrbQuKWS6g3OhDgF0T:8pHU/+FThuvM86lK5b2JSiuu7Vi56g3Y

Malware Config

Targets

    • Target

      34178dfacf04efb4c8414857aaa61e33116d393386bc91d3d1eab2863d63fdce

    • Size

      311KB

    • MD5

      54125454268caa329847e779814292f7

    • SHA1

      923b57be07dac538ab63e3d9fcd25c0f0a29e3ba

    • SHA256

      34178dfacf04efb4c8414857aaa61e33116d393386bc91d3d1eab2863d63fdce

    • SHA512

      75b85796c69d3774576eab6a5654127d3e14ec48e41dc693e642198ba60bc1930a0ab159b28a392c940e4b9c4739447f7c23bfcf1628d6ca7ccffe010be919a0

    • SSDEEP

      6144:8pwicXX/zS1FXDEMuvM86lK5bHWJdsiP0Hu7VBrbQuKWS6g3OhDgF0T:8pHU/+FThuvM86lK5b2JSiuu7Vi56g3Y

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (61) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks