General

  • Target

    c9bdf8a035b7115a401f1310d566ecc856a5a8ac9e50e139183bbea61d09c50f.exe

  • Size

    223KB

  • Sample

    240524-m3kb6sef26

  • MD5

    e68b6b6ad76efac51d8f9a74fb1c9f5f

  • SHA1

    50eef4876996cd7de411df18f62a76ae7485110a

  • SHA256

    c9bdf8a035b7115a401f1310d566ecc856a5a8ac9e50e139183bbea61d09c50f

  • SHA512

    62e19ea4e0f1d0b4d6c4c9a00320a49e7a25f60de792bdf3d669ee538ccfc946777dc55514b90fc67b095fce2c2d4d8565f5d8e0ca821a6aeac0814cdb8b7aac

  • SSDEEP

    3072:ccm0T6QhhuPQcM4qGDIctsqlu1BQpv/wGffbBE+6iY++SnPAaFyxOmAp03KtqDFu:cL0ueMPbVmYlnwufp6i9+SPIOp03KYo

Malware Config

Targets

    • Target

      c9bdf8a035b7115a401f1310d566ecc856a5a8ac9e50e139183bbea61d09c50f.exe

    • Size

      223KB

    • MD5

      e68b6b6ad76efac51d8f9a74fb1c9f5f

    • SHA1

      50eef4876996cd7de411df18f62a76ae7485110a

    • SHA256

      c9bdf8a035b7115a401f1310d566ecc856a5a8ac9e50e139183bbea61d09c50f

    • SHA512

      62e19ea4e0f1d0b4d6c4c9a00320a49e7a25f60de792bdf3d669ee538ccfc946777dc55514b90fc67b095fce2c2d4d8565f5d8e0ca821a6aeac0814cdb8b7aac

    • SSDEEP

      3072:ccm0T6QhhuPQcM4qGDIctsqlu1BQpv/wGffbBE+6iY++SnPAaFyxOmAp03KtqDFu:cL0ueMPbVmYlnwufp6i9+SPIOp03KYo

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (91) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks