General

  • Target

    tmplogmueij

  • Size

    1.5MB

  • Sample

    240803-h5c9eswfmj

  • MD5

    fee7c379f3a555c5c821e872ec384a91

  • SHA1

    7346e2e29faddd63ae5c610c07acab46b2b1b176

  • SHA256

    1db93ee81050da0ba413543f9fbc388499a466792f9a54ea6f1bbdb712ba9690

  • SHA512

    5daecbea4102f9b6c431afa1d6d5bb196594e7c9640d7a8b388669268d737d6e4277797504a86169b410ccf3cd6e92e0c55065d15a495a398bc27607567d1497

  • SSDEEP

    24576:uSR66R9LwWCc9FFZUZVClJYkLbdf/nixuiO4DGDGW3628rKR1q+ClmJcpd++GMzr:uQvL9SWTVilyfMFo8D1b

Malware Config

Targets

    • Target

      tmplogmueij

    • Size

      1.5MB

    • MD5

      fee7c379f3a555c5c821e872ec384a91

    • SHA1

      7346e2e29faddd63ae5c610c07acab46b2b1b176

    • SHA256

      1db93ee81050da0ba413543f9fbc388499a466792f9a54ea6f1bbdb712ba9690

    • SHA512

      5daecbea4102f9b6c431afa1d6d5bb196594e7c9640d7a8b388669268d737d6e4277797504a86169b410ccf3cd6e92e0c55065d15a495a398bc27607567d1497

    • SSDEEP

      24576:uSR66R9LwWCc9FFZUZVClJYkLbdf/nixuiO4DGDGW3628rKR1q+ClmJcpd++GMzr:uQvL9SWTVilyfMFo8D1b

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops file in Drivers directory

    • Manipulates Digital Signatures

      Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks