General

  • Target

    1 (2).exe

  • Size

    925KB

  • Sample

    240719-lx8bdavdrn

  • MD5

    5ff769ff13ba508089cfb5894b9a8736

  • SHA1

    e658001283f760651109fb0cc342d596201c7f45

  • SHA256

    4868b3c263fdaf8dd3d124d5e7a8f02889f94af20f4bfd4d584f443ffee37d4a

  • SHA512

    e088f0e9cb01274e9867fa956c9398fed0bf1e7e791dafe646230c10913f393512883d2d7e860fee763a39861c843a360d243a566e0320995db1e6dffefa5da3

  • SSDEEP

    24576:U8m657w6ZBLmkitKqBCjC0PDgM5AH5DT5:4VV1BCjBEDT

Malware Config

Targets

    • Target

      1 (2).exe

    • Size

      925KB

    • MD5

      5ff769ff13ba508089cfb5894b9a8736

    • SHA1

      e658001283f760651109fb0cc342d596201c7f45

    • SHA256

      4868b3c263fdaf8dd3d124d5e7a8f02889f94af20f4bfd4d584f443ffee37d4a

    • SHA512

      e088f0e9cb01274e9867fa956c9398fed0bf1e7e791dafe646230c10913f393512883d2d7e860fee763a39861c843a360d243a566e0320995db1e6dffefa5da3

    • SSDEEP

      24576:U8m657w6ZBLmkitKqBCjC0PDgM5AH5DT5:4VV1BCjBEDT

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (157) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks