Resubmissions

25-07-2024 14:13

240725-rjwy3ssgnl 10

25-06-2024 17:30

240625-v25wgswcjj 10

General

  • Target

    dcaf62ee4637397b2aaa73dbe41cfb514c71565f1d4770944c9b678cd2545087.7z

  • Size

    52KB

  • Sample

    240725-rjwy3ssgnl

  • MD5

    72bd20c56bca1cc9139e8e74e2f8de6e

  • SHA1

    f1a0f9085e24752869ed8148acf0a9b4db45a761

  • SHA256

    4d3d315c87af193af02eb5489fa7228b9ecc3aef75464325acc38a9a8c232b02

  • SHA512

    64a5d579d66f7b79be0c2b5cd24b07db392a72b4fb71a818fc6b4d9ff43a0e2e1d6dd534771a47d050c0ae2e81301aada5f3870f0adab33330f77f615c9fb7ff

  • SSDEEP

    768:K+NY5ECCf+xa0sE2kkizIAGNGpU3jFtq9JyLqWpc7jwWlYKWPE5S6NoAudS9BH:K+NkECCcDwNUUz36JyL/dWlIuNFnH

Malware Config

Targets

    • Target

      dcaf62ee4637397b2aaa73dbe41cfb514c71565f1d4770944c9b678cd2545087

    • Size

      110KB

    • MD5

      addafbaa977dde4a5207b3abc3caf24c

    • SHA1

      9df19b7170ecab89f87ba22f2700e5534eda297b

    • SHA256

      dcaf62ee4637397b2aaa73dbe41cfb514c71565f1d4770944c9b678cd2545087

    • SHA512

      f0777595040f4c50abd8db0943f1728b145bee1bdbec58ab2040d7dae8677479b0ecaccf0a7ab311b9374ccd128148d1ae6c20cb7fec2f28ff4f7049b2212f9e

    • SSDEEP

      3072:aagoUqGqGRdi2RcKKmLgGFuCp+8rWgGbmOGgkF9x+vUABeZhaj:fCZPnFj+2OC+07K

    • PLAY Ransomware, PlayCrypt

      Ransomware family first seen in mid 2022.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Renames multiple (8488) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks