General

  • Target

    dessin.png

  • Size

    80KB

  • Sample

    240702-qxkyasyerp

  • MD5

    3c8ee9f208a665067b7c45c09364bd66

  • SHA1

    d520f752e9900f0665de10c3a52599903d86d7fd

  • SHA256

    34fd09da6124082ba6ccb2bef210c1afac9e0c6ba99a0e5c55062f338590ed67

  • SHA512

    ff110d3a463787f552640bc21f7ec5d1d930eb7997caa74b9bfee6e5b8d880362e79304eeac31a7dd384cc70f80efadb1b24e56075e784477c8f32a1c09aaac0

  • SSDEEP

    1536:l/286I6rdvOkwJ+g1hYZ2ewLXLbCQXTbvprTUV2wUE6PJ:lO86I6rHw8eYZ7wLXLbCQXTbvpHKEJ

Malware Config

Targets

    • Target

      dessin.png

    • Size

      80KB

    • MD5

      3c8ee9f208a665067b7c45c09364bd66

    • SHA1

      d520f752e9900f0665de10c3a52599903d86d7fd

    • SHA256

      34fd09da6124082ba6ccb2bef210c1afac9e0c6ba99a0e5c55062f338590ed67

    • SHA512

      ff110d3a463787f552640bc21f7ec5d1d930eb7997caa74b9bfee6e5b8d880362e79304eeac31a7dd384cc70f80efadb1b24e56075e784477c8f32a1c09aaac0

    • SSDEEP

      1536:l/286I6rdvOkwJ+g1hYZ2ewLXLbCQXTbvprTUV2wUE6PJ:lO86I6rHw8eYZ7wLXLbCQXTbvpHKEJ

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (517) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks