General

  • Target

    3b50210d61984bfae5bb86a578ddc490N.exe

  • Size

    184KB

  • Sample

    240807-be537awdrp

  • MD5

    3b50210d61984bfae5bb86a578ddc490

  • SHA1

    545f9a863fad86816b09509ab918f0564cf2028e

  • SHA256

    c7e4f4b1440aff31bbb0ef410ca535375ece1a84f9485507363313369234b769

  • SHA512

    96d9e984b9129de388c1b3b90fdf0c78d8782f254e31e0a8b07fa9388d2d75cfb89a248dc931f12424ea1827af527e1a8f10af2d2dd4143cd5ba2bb2a928d3f4

  • SSDEEP

    3072:HGRf4w6gH9kEfvtXLDqjLjIPOSASb8hfoFop4TDCr0iGMrAACu:HGRQfgH9LJDqjvc44TDG0i3rfh

Malware Config

Targets

    • Target

      3b50210d61984bfae5bb86a578ddc490N.exe

    • Size

      184KB

    • MD5

      3b50210d61984bfae5bb86a578ddc490

    • SHA1

      545f9a863fad86816b09509ab918f0564cf2028e

    • SHA256

      c7e4f4b1440aff31bbb0ef410ca535375ece1a84f9485507363313369234b769

    • SHA512

      96d9e984b9129de388c1b3b90fdf0c78d8782f254e31e0a8b07fa9388d2d75cfb89a248dc931f12424ea1827af527e1a8f10af2d2dd4143cd5ba2bb2a928d3f4

    • SSDEEP

      3072:HGRf4w6gH9kEfvtXLDqjLjIPOSASb8hfoFop4TDCr0iGMrAACu:HGRQfgH9LJDqjvc44TDG0i3rfh

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (52) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks