General

  • Target

    Loader.zip

  • Size

    94KB

  • Sample

    240715-jzka8awfll

  • MD5

    d098e694f4bb6d956c44733f5d4a10bf

  • SHA1

    b4883902ff91932da01d3c45efeb4712ff694dd2

  • SHA256

    d2d690bcb348fcc6afeaba3fb88ebb1c29df30ebec7aaf85fd91ccf4582693a3

  • SHA512

    828b8f2590f2016806bab6d776068a3dda543e32679f7dc088af1c0a98602b6c5798ec8bbaf22f959d71f29ad5df470cbc2714ab399b0698f2f128bfb53e7374

  • SSDEEP

    1536:GrMMFx7IZJRbbMvODx4aQybep5UR/yxe1Baiws7LToj+DRqGMyhQEtftnMUa7vq7:wbx7IJMvQ4aFbesdyxaXX1DRn5MUabq7

Malware Config

Targets

    • Target

      Loader 3.0.exe

    • Size

      147KB

    • MD5

      ff4cd364323fc2048c35783a38070aef

    • SHA1

      4736172dd07a3a196343b94dd56b4e4edc0f2bce

    • SHA256

      6dd7522accb6773bade16720b53ca577574defae5b1c7caf4b7fc6826dfed7e7

    • SHA512

      c72b07b78ccbcfad14fa9f7bc3e8a086c29969b4f7f30dbe57a1a173cd82d61a20bf5ead0bc7b627d5d7f7f0def71710e2ce09590be7a886ad6c9414981eb961

    • SSDEEP

      1536:FzICS4AAwczUUf8y8gvMH+1zGSNAojMP95D1xDEtDyI4njdbJBGCkmsQwvB6jr4j:GqJogYkcSNm9V7Dk4F91qYUrnbT

    • Renames multiple (356) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks