General
-
Target
fab74fe6b288e4de3ffc2ad3794438671ae23ed9c69f6f28ce5baea1e7a07123
-
Size
2.5MB
-
Sample
240817-g8y5ma1hkg
-
MD5
3c19dad82c11efaafa43e3856c123263
-
SHA1
bf313b340c992db58448fa29784e25362e84543a
-
SHA256
fab74fe6b288e4de3ffc2ad3794438671ae23ed9c69f6f28ce5baea1e7a07123
-
SHA512
61edf8e4f8b310ba33781245faf20321ca0d526f0a0bb0d6d2747858b21e17d38d7e08a805a157b4e7c79c2e09ce874fbaf9d635fe9fe4b2ddac40890849aa42
-
SSDEEP
49152:xvnqmi6yLK3kXIw1GI3zOyZOfR99I3tjgeZAAOsuiX1WTvpRrVWJB2:EFLK3wIw3s5I3tcRAOom5WJB2
Static task
static1
Behavioral task
behavioral1
Sample
Trojan.BUG32.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Trojan.BUG32.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Trojan.BUG32.exe
-
Size
3.0MB
-
MD5
149cc2ec1900cb778afb50d8026eadf5
-
SHA1
a7bc1bbc7bdc970757ec369ef0b51dc53989f131
-
SHA256
817a695e53a1d6e24f2c701751b4d18468f20698f30fada420dfba6e21a09797
-
SHA512
d617654478beb6325d86c108cddaff8f8d658a235d26b8e0282ed85dca826bdb62b0b67e749c7cd421dbae1d98084220e2f4d5779badb8fd7ab07ff333a35553
-
SSDEEP
49152:Or2U5IahDUGN97rkqOAackLjQ0rZEAh3oA6wHE+K60Kk0aCLkfAZKt0OJTcL:4H2ahFNNrg3QbQoA6wHEnFN4IJu
-
Modifies WinLogon for persistence
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Renames multiple (157) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Modifies system executable filetype association
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1