General

  • Target

    4767854567ee5cfb28dae9181c9f076e7281996d3963524f10ce26cfdd342f42

  • Size

    89KB

  • Sample

    240618-zv4r3awfmh

  • MD5

    ee62df18944db6cb32e98eba83b9f960

  • SHA1

    859ab73f33ff8d5d1ddf78a5e9d6aa34f15c9dfa

  • SHA256

    4767854567ee5cfb28dae9181c9f076e7281996d3963524f10ce26cfdd342f42

  • SHA512

    df0a5ffbbd7194d6ef2015c564351be1b2b767bb29bbdf32c90734a92fae99b61fd584f6241e40dc604f0a74dc937d98225fc1791b1db54231daf6191a5c21fb

  • SSDEEP

    1536:1vXFnGvewvD/F3nICjRM5CELyYk2Iloa4GQeRCIiS8qRj4dh0NKYnEMvB:Dw3FE7yH2koa4ciS8qp4dh03EMvB

Malware Config

Targets

    • Target

      4767854567ee5cfb28dae9181c9f076e7281996d3963524f10ce26cfdd342f42

    • Size

      89KB

    • MD5

      ee62df18944db6cb32e98eba83b9f960

    • SHA1

      859ab73f33ff8d5d1ddf78a5e9d6aa34f15c9dfa

    • SHA256

      4767854567ee5cfb28dae9181c9f076e7281996d3963524f10ce26cfdd342f42

    • SHA512

      df0a5ffbbd7194d6ef2015c564351be1b2b767bb29bbdf32c90734a92fae99b61fd584f6241e40dc604f0a74dc937d98225fc1791b1db54231daf6191a5c21fb

    • SSDEEP

      1536:1vXFnGvewvD/F3nICjRM5CELyYk2Iloa4GQeRCIiS8qRj4dh0NKYnEMvB:Dw3FE7yH2koa4ciS8qp4dh03EMvB

    • Renames multiple (269) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks