General

  • Target

    index.exe

  • Size

    35.9MB

  • Sample

    240710-xjrl9awhkd

  • MD5

    196934b46f80643a3055100ddfffca72

  • SHA1

    a21d7651624c3c43a88c262ce8f4ed92bab7bca1

  • SHA256

    51b5e4a35ba6ce0236dee72d85dfe08566248e6c586934e18225b619145d8de0

  • SHA512

    c4637a8ce74fe1f397807289f5ce6cfbba7b72e21e3689f52fedd76a5c907618b830c8a13b03250573b5bd1efe7d4753a93a8b87d891c666a188582e537c03c5

  • SSDEEP

    393216:f1Du8BtuBw2FEL3Z3aLUoQvo6LP/SgbSpYvKEh1EdKwlGQKPJuGsiTfREsrgCYfz:fMguj8Q4VfvDqFTrYG

Malware Config

Targets

    • Target

      index.exe

    • Size

      35.9MB

    • MD5

      196934b46f80643a3055100ddfffca72

    • SHA1

      a21d7651624c3c43a88c262ce8f4ed92bab7bca1

    • SHA256

      51b5e4a35ba6ce0236dee72d85dfe08566248e6c586934e18225b619145d8de0

    • SHA512

      c4637a8ce74fe1f397807289f5ce6cfbba7b72e21e3689f52fedd76a5c907618b830c8a13b03250573b5bd1efe7d4753a93a8b87d891c666a188582e537c03c5

    • SSDEEP

      393216:f1Du8BtuBw2FEL3Z3aLUoQvo6LP/SgbSpYvKEh1EdKwlGQKPJuGsiTfREsrgCYfz:fMguj8Q4VfvDqFTrYG

    • Lockbit

      Ransomware family with multiple variants released since late 2019.

    • Rule to detect Lockbit 3.0 ransomware Windows payload

    • Renames multiple (638) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks