General

  • Target

    36515fe735a7e69d8434dff3c134a298.bin

  • Size

    153KB

  • Sample

    240701-bzvsyswajm

  • MD5

    36515fe735a7e69d8434dff3c134a298

  • SHA1

    ec6ba4b24f967339432c26559dea68624b251a6e

  • SHA256

    79e6b988a1c90cf8b3dd2d77b5e7684048afa397eb6d6bcd97125c5f136ad11e

  • SHA512

    c4be0a594d966e7e390a91e088f52726a48ea164349ce9adfb866085ed4a3b967d5a1a62ed8d592074118234bcc2bc5e4a09f909d4a34779c5aed45d2d249281

  • SSDEEP

    3072:jP2jsnPhjww+LwEiSOzPBDlXw0WKWvLmxHNLU3vJVvO:rksGw+UEiSOzPBDdw3KWyrg3vJVv

Malware Config

Targets

    • Target

      36515fe735a7e69d8434dff3c134a298.bin

    • Size

      153KB

    • MD5

      36515fe735a7e69d8434dff3c134a298

    • SHA1

      ec6ba4b24f967339432c26559dea68624b251a6e

    • SHA256

      79e6b988a1c90cf8b3dd2d77b5e7684048afa397eb6d6bcd97125c5f136ad11e

    • SHA512

      c4be0a594d966e7e390a91e088f52726a48ea164349ce9adfb866085ed4a3b967d5a1a62ed8d592074118234bcc2bc5e4a09f909d4a34779c5aed45d2d249281

    • SSDEEP

      3072:jP2jsnPhjww+LwEiSOzPBDlXw0WKWvLmxHNLU3vJVvO:rksGw+UEiSOzPBDdw3KWyrg3vJVv

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (63) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks