General

  • Target

    25c6eb273edceebb6b4d3f6d382a3890ab1b5575b0605e95e8c02375a5c83964

  • Size

    141KB

  • Sample

    240807-ynqfestamk

  • MD5

    5ae42f93bb14b553f52bd15845b0992b

  • SHA1

    f390fab5e976495686e13bac55fb7c6600cb04f9

  • SHA256

    25c6eb273edceebb6b4d3f6d382a3890ab1b5575b0605e95e8c02375a5c83964

  • SHA512

    d3b9494e1d5ee9c20ca019d5e65f1fa83f3b3ee875001c3a5abf36503af4b94fc2bd8e75fae430b7c0b94d74f7e23ae3af228ee8602e7ee685d9e7ddb1ec3858

  • SSDEEP

    3072:wOXwqohogPKl0eIR8ex4z+nbZGfXIPqPy+YU2Xt+1:zngPKlP2844z+nbZGfXIC6+E9+

Malware Config

Targets

    • Target

      25c6eb273edceebb6b4d3f6d382a3890ab1b5575b0605e95e8c02375a5c83964

    • Size

      141KB

    • MD5

      5ae42f93bb14b553f52bd15845b0992b

    • SHA1

      f390fab5e976495686e13bac55fb7c6600cb04f9

    • SHA256

      25c6eb273edceebb6b4d3f6d382a3890ab1b5575b0605e95e8c02375a5c83964

    • SHA512

      d3b9494e1d5ee9c20ca019d5e65f1fa83f3b3ee875001c3a5abf36503af4b94fc2bd8e75fae430b7c0b94d74f7e23ae3af228ee8602e7ee685d9e7ddb1ec3858

    • SSDEEP

      3072:wOXwqohogPKl0eIR8ex4z+nbZGfXIPqPy+YU2Xt+1:zngPKlP2844z+nbZGfXIC6+E9+

    • Jigsaw Ransomware

      Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.

    • Renames multiple (2027) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks