General

  • Target

    aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf

  • Size

    610KB

  • Sample

    240615-a1y2bswgpq

  • MD5

    da97e6d9e3508bb209c851da4aaa8f2f

  • SHA1

    f7f4888b4a08c7433169fc045d05d8f9561d58ba

  • SHA256

    aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf

  • SHA512

    8b8193e39881157597b42a87303d0cc031fef10b646e661a74eebf42e66debfb0c5b4700c8a226a0b73dde8b9708812874c18d41e57e89d718816a3d16a215f3

  • SSDEEP

    12288:b4vC5gvNcUHXg+mkoBIZuEp++7PVkb41gx32rT:b4vCSvNcGXm1IAEp++Ba4mx

Malware Config

Targets

    • Target

      aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf

    • Size

      610KB

    • MD5

      da97e6d9e3508bb209c851da4aaa8f2f

    • SHA1

      f7f4888b4a08c7433169fc045d05d8f9561d58ba

    • SHA256

      aa5add609a047ea6bf5cf3caca5510d82833d3873dc3e04bd98f1abb5b52b2cf

    • SHA512

      8b8193e39881157597b42a87303d0cc031fef10b646e661a74eebf42e66debfb0c5b4700c8a226a0b73dde8b9708812874c18d41e57e89d718816a3d16a215f3

    • SSDEEP

      12288:b4vC5gvNcUHXg+mkoBIZuEp++7PVkb41gx32rT:b4vCSvNcGXm1IAEp++Ba4mx

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (59) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks