General

  • Target

    222e2b91f5becea8c7c05883e4a58796a1f68628fbb0852b533fed08d8e9b853.zip

  • Size

    91KB

  • Sample

    240808-vp1q1awerm

  • MD5

    4c78911b2d4b718eec7fd8fb1bfd4383

  • SHA1

    e0c1569abc5648238d15444babc3b8f5154b0211

  • SHA256

    27a225dd98b3c1d85e83b068ff23ac704fe9e317c4a3286b39a382a07e7bafde

  • SHA512

    353ba9fce3cdc3661b5988cccd4f70012aa7e9df1e5409d87ed55e47c9b78c13695d7534f885e2f53faf9eec522c6865c28528b72bbd54fb64f4dddd980b65a7

  • SSDEEP

    1536:NLVwHkm3HzUoVT2yGHF51vSyy7eqFNcwImDPNu1QScQ4NhW/qo2S/aho5txSh5/U:NL+XzVVT2rHFX+eONTIqPNueSL4aV58k

Malware Config

Targets

    • Target

      222e2b91f5becea8c7c05883e4a58796a1f68628fbb0852b533fed08d8e9b853

    • Size

      224KB

    • MD5

      033acf3b0f699a39becdc71d3e2dddcc

    • SHA1

      5949c404aee552fc8ce29e3bf77bd08e54d37c59

    • SHA256

      222e2b91f5becea8c7c05883e4a58796a1f68628fbb0852b533fed08d8e9b853

    • SHA512

      604ba9e02ec18b8ad1005ec3d86970261925a1d2c198a975387beb62a9711012733b92e7641a5687af835cf1ddb5b6c6d732b33a12387a3a293ca08929f7fb50

    • SSDEEP

      3072:xtsD+K6k7UXP6ih6XULC9GHJkmm8GxTyPGryXdEekUuIiMi:4D+33P6Y6XGpY8G5yore3u5Mi

    • Meow

      A ransomware that wipes unsecured databases first seen in Mid 2020.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Renames multiple (8008) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks