General

  • Target

    57f8e93f90b914bf567dcfa9bcd2ec60N.exe

  • Size

    119KB

  • Sample

    240722-ehk4zawcrc

  • MD5

    57f8e93f90b914bf567dcfa9bcd2ec60

  • SHA1

    3b9b8b264798d2b9c30f75e4aee9f2f88dc64d08

  • SHA256

    b4820532b916dfef99ebaa74f940cd502ed9ee1e859571c0fb64437df509e628

  • SHA512

    d8aebe8dc0fbc5c78b2024f274303b5502a3c50570406aa5959471d36dd5e7258ccb24345c48680ff6aebbb99e1a722709bd60692bcf0afb9f1cff1ad61e8624

  • SSDEEP

    1536:dH+aignyGOf/+B4vnZ/pLh1as2LP5wOgfTy4LgJMkSO7FE2l6IUY1M29ndgY:dugOf/+BgV3asEROuQg+OEIL9gY

Malware Config

Targets

    • Target

      57f8e93f90b914bf567dcfa9bcd2ec60N.exe

    • Size

      119KB

    • MD5

      57f8e93f90b914bf567dcfa9bcd2ec60

    • SHA1

      3b9b8b264798d2b9c30f75e4aee9f2f88dc64d08

    • SHA256

      b4820532b916dfef99ebaa74f940cd502ed9ee1e859571c0fb64437df509e628

    • SHA512

      d8aebe8dc0fbc5c78b2024f274303b5502a3c50570406aa5959471d36dd5e7258ccb24345c48680ff6aebbb99e1a722709bd60692bcf0afb9f1cff1ad61e8624

    • SSDEEP

      1536:dH+aignyGOf/+B4vnZ/pLh1as2LP5wOgfTy4LgJMkSO7FE2l6IUY1M29ndgY:dugOf/+BgV3asEROuQg+OEIL9gY

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (82) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks