General

  • Target

    17c963bd9a9ba87c8d7ece7f157e1aa0.bin

  • Size

    1.6MB

  • Sample

    240708-cbg3maxanm

  • MD5

    17c963bd9a9ba87c8d7ece7f157e1aa0

  • SHA1

    919676969c00f632c5d622c970887090f21fcce6

  • SHA256

    e1a5fa3567d60770bad8948468b70e9de71244a18fa2fee8d9285b959a9bb70f

  • SHA512

    9393c54973f33786b1db678dbdd8e573b68071385513f1a56f6f582e6ca857baa6307ac6ee8827187494606230550d6dc3c2a82295adbc9d20da4673b3eea286

  • SSDEEP

    12288:0DQ4TNG+Oplm6R2lqtiI4MpXM+bbXGqWZgZUC6hej6pV36fo0TC6v0:0DQK1Obm+2lda/XFWZ+ZeD6fHOX

Malware Config

Targets

    • Target

      17c963bd9a9ba87c8d7ece7f157e1aa0.bin

    • Size

      1.6MB

    • MD5

      17c963bd9a9ba87c8d7ece7f157e1aa0

    • SHA1

      919676969c00f632c5d622c970887090f21fcce6

    • SHA256

      e1a5fa3567d60770bad8948468b70e9de71244a18fa2fee8d9285b959a9bb70f

    • SHA512

      9393c54973f33786b1db678dbdd8e573b68071385513f1a56f6f582e6ca857baa6307ac6ee8827187494606230550d6dc3c2a82295adbc9d20da4673b3eea286

    • SSDEEP

      12288:0DQ4TNG+Oplm6R2lqtiI4MpXM+bbXGqWZgZUC6hej6pV36fo0TC6v0:0DQK1Obm+2lda/XFWZ+ZeD6fHOX

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (69) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks