General

  • Target

    6739d184a7d61875fbfcdfa8e0ccdf70N.exe

  • Size

    115KB

  • Sample

    240726-24r6qs1akq

  • MD5

    6739d184a7d61875fbfcdfa8e0ccdf70

  • SHA1

    40c20c2892f21bbddacc570df0149ab299243268

  • SHA256

    8b02075e9fd2c4d454df5685e584c9ac2c65c69ed8164236d6c9ee1f98bfe92e

  • SHA512

    9b1962925a19cf84135d0d4b97fd6c26e1ad6382287a61fc203ffdf2b87f1ac40ef5b2757ccdf992daebe64e1399eeb49202dbed8a960380401375c51e1da784

  • SSDEEP

    3072:v18bjbfJDl9ewkdkfv0an/UV1xvDKxX98id0QvBJFQ:vQ9Z0sUTe02J+

Malware Config

Targets

    • Target

      6739d184a7d61875fbfcdfa8e0ccdf70N.exe

    • Size

      115KB

    • MD5

      6739d184a7d61875fbfcdfa8e0ccdf70

    • SHA1

      40c20c2892f21bbddacc570df0149ab299243268

    • SHA256

      8b02075e9fd2c4d454df5685e584c9ac2c65c69ed8164236d6c9ee1f98bfe92e

    • SHA512

      9b1962925a19cf84135d0d4b97fd6c26e1ad6382287a61fc203ffdf2b87f1ac40ef5b2757ccdf992daebe64e1399eeb49202dbed8a960380401375c51e1da784

    • SSDEEP

      3072:v18bjbfJDl9ewkdkfv0an/UV1xvDKxX98id0QvBJFQ:vQ9Z0sUTe02J+

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (82) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks