General

  • Target

    082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113

  • Size

    273KB

  • Sample

    240525-w1hv1add2y

  • MD5

    455a7fabe1641afa6940f7537d7cee54

  • SHA1

    dd544da1945c8ea26acd229eb8712378d0225227

  • SHA256

    082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113

  • SHA512

    8e7547c8d2e73f5e3b9ca65a0d80436d5e83dba239c03801e56a708c31952f857364d4a486de507c6e589072b01b38f28939401634e0728a7659bdd339b48238

  • SSDEEP

    6144:jV0X5Gl3WlRYgwERjDuV7hOWC1ECIg6dY1c+V+th:je5xkyRjD2cWWHtaYy+0

Malware Config

Targets

    • Target

      082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113

    • Size

      273KB

    • MD5

      455a7fabe1641afa6940f7537d7cee54

    • SHA1

      dd544da1945c8ea26acd229eb8712378d0225227

    • SHA256

      082973bf90e1f66fa1b2eb4593333b1c41e705b6261eecb869fe1b7af222f113

    • SHA512

      8e7547c8d2e73f5e3b9ca65a0d80436d5e83dba239c03801e56a708c31952f857364d4a486de507c6e589072b01b38f28939401634e0728a7659bdd339b48238

    • SSDEEP

      6144:jV0X5Gl3WlRYgwERjDuV7hOWC1ECIg6dY1c+V+th:je5xkyRjD2cWWHtaYy+0

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (64) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Modify Registry

4
T1112

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks