General

  • Target

    174577244fb6cbf49b641b529431a70dfef29a60e993f6351b2aa3eca00755bb

  • Size

    119KB

  • Sample

    240625-xnj3zaxapc

  • MD5

    093d4fcba66e1d8d5b6203157b3c4167

  • SHA1

    2d1b77b0ffa1fe926b4072c327d232d29b88884f

  • SHA256

    174577244fb6cbf49b641b529431a70dfef29a60e993f6351b2aa3eca00755bb

  • SHA512

    f1c85f367889011ee6512daa960d2babb6d7455bc638158e47d389a511aa374e23ad965f1a36ebc5092558f40147ee9624c976c29b7482e309662492a70b0b44

  • SSDEEP

    3072:fD6BMIU0VQhlPh9hSftRcaFfVIIIIIIII:fD6iIU0qhdh9hSlRDF9IIIIIIII

Malware Config

Targets

    • Target

      174577244fb6cbf49b641b529431a70dfef29a60e993f6351b2aa3eca00755bb

    • Size

      119KB

    • MD5

      093d4fcba66e1d8d5b6203157b3c4167

    • SHA1

      2d1b77b0ffa1fe926b4072c327d232d29b88884f

    • SHA256

      174577244fb6cbf49b641b529431a70dfef29a60e993f6351b2aa3eca00755bb

    • SHA512

      f1c85f367889011ee6512daa960d2babb6d7455bc638158e47d389a511aa374e23ad965f1a36ebc5092558f40147ee9624c976c29b7482e309662492a70b0b44

    • SSDEEP

      3072:fD6BMIU0VQhlPh9hSftRcaFfVIIIIIIII:fD6iIU0qhdh9hSlRDF9IIIIIIII

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (83) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks