General

  • Target

    2024-05-27_6f9920cf81c169dd0e4dad7ffedd4785_bkransomware

  • Size

    71KB

  • Sample

    240527-hacdmsbb2t

  • MD5

    6f9920cf81c169dd0e4dad7ffedd4785

  • SHA1

    33f22f894b423c7956701307f6a7fb1721ad7756

  • SHA256

    d21df160b38e060e6552b89534a2e88f8b919a526a095a4307f0823db3e49b08

  • SHA512

    99dff00a65ed5c37d6b86e949618c2bf4aa00b076f44befa21d04301c3c1fa3653278001b28571d5d0677b92804fbb78ca4930571ba82da24757b3639c7d036c

  • SSDEEP

    1536:Fc8N7UsWjcd9w+AyabjDbxE+MwmvlzuazTG:ZRpAyazIliazTG

Malware Config

Targets

    • Target

      2024-05-27_6f9920cf81c169dd0e4dad7ffedd4785_bkransomware

    • Size

      71KB

    • MD5

      6f9920cf81c169dd0e4dad7ffedd4785

    • SHA1

      33f22f894b423c7956701307f6a7fb1721ad7756

    • SHA256

      d21df160b38e060e6552b89534a2e88f8b919a526a095a4307f0823db3e49b08

    • SHA512

      99dff00a65ed5c37d6b86e949618c2bf4aa00b076f44befa21d04301c3c1fa3653278001b28571d5d0677b92804fbb78ca4930571ba82da24757b3639c7d036c

    • SSDEEP

      1536:Fc8N7UsWjcd9w+AyabjDbxE+MwmvlzuazTG:ZRpAyazIliazTG

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks