General

  • Target

    7ac7d0a8488d1f18acec1a7269dfae80N.exe

  • Size

    488KB

  • Sample

    240727-bymqys1ene

  • MD5

    7ac7d0a8488d1f18acec1a7269dfae80

  • SHA1

    ec32f3e25671312eb3a37d965c91a2fd1ec60dcd

  • SHA256

    68278808d38276b3ae7751c92ca02e339961cccbdbe5d618105680c9395d615a

  • SHA512

    98faa574c665fbd123dd4a6cce534b1871c8d8baab9128aa0630decd196c21ba63e043acdde48be0df1ca2bbfd9f15308f4dac387a6e3b6f7b94514f8f158035

  • SSDEEP

    12288:xCsRuyiViUJ9Ue31Jg4Fvd/1Hdi/QCornhrvSqF2W3:xCsRuDVxJ+bm/q2rnh7x2

Malware Config

Targets

    • Target

      7ac7d0a8488d1f18acec1a7269dfae80N.exe

    • Size

      488KB

    • MD5

      7ac7d0a8488d1f18acec1a7269dfae80

    • SHA1

      ec32f3e25671312eb3a37d965c91a2fd1ec60dcd

    • SHA256

      68278808d38276b3ae7751c92ca02e339961cccbdbe5d618105680c9395d615a

    • SHA512

      98faa574c665fbd123dd4a6cce534b1871c8d8baab9128aa0630decd196c21ba63e043acdde48be0df1ca2bbfd9f15308f4dac387a6e3b6f7b94514f8f158035

    • SSDEEP

      12288:xCsRuyiViUJ9Ue31Jg4Fvd/1Hdi/QCornhrvSqF2W3:xCsRuDVxJ+bm/q2rnh7x2

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (72) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks