General

  • Target

    sample

  • Size

    19KB

  • Sample

    240605-weml3aed26

  • MD5

    794cfcc148a7c97e3c23faa8c41c0410

  • SHA1

    5e1546164a56e61a1f4ef16960cb88e965606501

  • SHA256

    a6aad5cd9bad145d88781420e8e608ca89b10873e919a9784fc9917600c78237

  • SHA512

    5443edaef0e7add7ed1084685827f678082796c77fc700700bf2b34c9c0e1def4ebd9f243be5f05d0a9088f86aed04aa89fc882ba238ab843193488aed9b51e5

  • SSDEEP

    384:r2SncKmGDpmReVoOs4Ni9ylKeGMPU8Hhhbr1I7yo2paWhOwob07+h28JCdJn1:r2ScxGBVoOs4NmyI1M3BhbpmLWhOwoby

Malware Config

Targets

    • Target

      sample

    • Size

      19KB

    • MD5

      794cfcc148a7c97e3c23faa8c41c0410

    • SHA1

      5e1546164a56e61a1f4ef16960cb88e965606501

    • SHA256

      a6aad5cd9bad145d88781420e8e608ca89b10873e919a9784fc9917600c78237

    • SHA512

      5443edaef0e7add7ed1084685827f678082796c77fc700700bf2b34c9c0e1def4ebd9f243be5f05d0a9088f86aed04aa89fc882ba238ab843193488aed9b51e5

    • SSDEEP

      384:r2SncKmGDpmReVoOs4Ni9ylKeGMPU8Hhhbr1I7yo2paWhOwob07+h28JCdJn1:r2ScxGBVoOs4NmyI1M3BhbpmLWhOwoby

    • Renames multiple (125) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks