General

  • Target

    6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad

  • Size

    116KB

  • Sample

    240811-18ln3swaqd

  • MD5

    1bbc0b2d05e142a54b1174e4faf1cc02

  • SHA1

    9c3ab35422d4a9a684fc31917889a31487396cc2

  • SHA256

    6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad

  • SHA512

    957abdc5d1b0c2595f0e7f74ae76eca0e7b04997e33eb8623904976c247a98de2e0c015eedf9b7b40939b5e8dc7ff1da9a069b1bd86cc0d76a4e0f332bf76da5

  • SSDEEP

    3072:64JwqCUE0YsSc0o0QE5aTtbcfI9YIoNEs3Nlh8v9wsXV:6Iw5B0YK0o0QEkTtbcfI9YdEs3Dhmw

Malware Config

Targets

    • Target

      6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad

    • Size

      116KB

    • MD5

      1bbc0b2d05e142a54b1174e4faf1cc02

    • SHA1

      9c3ab35422d4a9a684fc31917889a31487396cc2

    • SHA256

      6eaa1ac01d9e7d7bfd230b5ce09625bd1bd737c47f417ac1745d9d51c91245ad

    • SHA512

      957abdc5d1b0c2595f0e7f74ae76eca0e7b04997e33eb8623904976c247a98de2e0c015eedf9b7b40939b5e8dc7ff1da9a069b1bd86cc0d76a4e0f332bf76da5

    • SSDEEP

      3072:64JwqCUE0YsSc0o0QE5aTtbcfI9YIoNEs3Nlh8v9wsXV:6Iw5B0YK0o0QEkTtbcfI9YdEs3Dhmw

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (83) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks