General

  • Target

    6aa4c72bb0a58a873dc977e6b6356c40N.exe

  • Size

    317KB

  • Sample

    240807-fsx2ysvgnf

  • MD5

    6aa4c72bb0a58a873dc977e6b6356c40

  • SHA1

    024c0a209dd8279b1d98133b6537e313635cc30b

  • SHA256

    78b58a1226045a60942623ad28cf654a093bfd81876f1649bf8fbcb9a539f917

  • SHA512

    c17780e17268919fbe46990aaef98983608952c92f96281e539d251d5edceab3057c7c2ea24627bc3783df2d97050b13c3ac74be1822e92b9eb76eedfca4d220

  • SSDEEP

    6144:GtW0Px0I/viaVk7KDOfKmZG+Ov67g130YfC1G3Jzwf1B9XN6GL:G4I/vi6PD1QGDyRWc7H6G

Malware Config

Targets

    • Target

      6aa4c72bb0a58a873dc977e6b6356c40N.exe

    • Size

      317KB

    • MD5

      6aa4c72bb0a58a873dc977e6b6356c40

    • SHA1

      024c0a209dd8279b1d98133b6537e313635cc30b

    • SHA256

      78b58a1226045a60942623ad28cf654a093bfd81876f1649bf8fbcb9a539f917

    • SHA512

      c17780e17268919fbe46990aaef98983608952c92f96281e539d251d5edceab3057c7c2ea24627bc3783df2d97050b13c3ac74be1822e92b9eb76eedfca4d220

    • SSDEEP

      6144:GtW0Px0I/viaVk7KDOfKmZG+Ov67g130YfC1G3Jzwf1B9XN6GL:G4I/vi6PD1QGDyRWc7H6G

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (53) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks