General

  • Target

    saher_ransomware.exe

  • Size

    588KB

  • Sample

    240722-tk5cyswfqm

  • MD5

    80479d26ca4b35c1783ccec53cfe65a6

  • SHA1

    bbfc4ca10b4a48dfec16cf02e3a8cad653dd1373

  • SHA256

    0b355f51d9f38a31fefcc0efa9e039a4c27914c43c8e286c770706fa2dae1951

  • SHA512

    5ed377c4863030c24589c03b5abd5e5f89901528a7ced026f7ab648826e72180d3d57397e81330c0d6fc4065425cea483752f7eb8a101443b9e83ee902de4b85

  • SSDEEP

    12288:oXJNcTukoHNHl7rX8hp18EaQiZWyEyY1ihb0urwAbehN:5T1ThNaQByY1qZr7IN

Malware Config

Targets

    • Target

      saher_ransomware.exe

    • Size

      588KB

    • MD5

      80479d26ca4b35c1783ccec53cfe65a6

    • SHA1

      bbfc4ca10b4a48dfec16cf02e3a8cad653dd1373

    • SHA256

      0b355f51d9f38a31fefcc0efa9e039a4c27914c43c8e286c770706fa2dae1951

    • SHA512

      5ed377c4863030c24589c03b5abd5e5f89901528a7ced026f7ab648826e72180d3d57397e81330c0d6fc4065425cea483752f7eb8a101443b9e83ee902de4b85

    • SSDEEP

      12288:oXJNcTukoHNHl7rX8hp18EaQiZWyEyY1ihb0urwAbehN:5T1ThNaQByY1qZr7IN

    • Renames multiple (1223) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

MITRE ATT&CK Enterprise v15

Tasks