General

  • Target

    c35eb7caf91eecce8ecf129eec3ff8652e72cf31f86ed45ea6ea4a5140acf680

  • Size

    254KB

  • Sample

    240901-sr4jkavbkj

  • MD5

    28df2c8790283fabdf0b305ef631eefa

  • SHA1

    bf290b4b19ee619c278cd24182eef67565710a04

  • SHA256

    c35eb7caf91eecce8ecf129eec3ff8652e72cf31f86ed45ea6ea4a5140acf680

  • SHA512

    6baaccff46c15281351fd4cba5323ad40a34095dc6b4a24fc8b029390bed47c8297e91bee7247ebed046ab1a058a0147ac4e41db48d4f649ecfe624662df39e8

  • SSDEEP

    6144:HG9TomNr+ufSIMVygorNQiyoGB0i4hDtzvrREKtyfRg8po:HGM2KufexKuiqmi4/zvtEKH8S

Malware Config

Targets

    • Target

      3bf44eb9dbe5252e59ca8b680507ad63d3af583f6a4ffe641a563fd3c8040146

    • Size

      315KB

    • MD5

      dc25873587082324e388be35b9a82127

    • SHA1

      b091e1bac14c016dbbd6c905df53aacbb1eb0167

    • SHA256

      3bf44eb9dbe5252e59ca8b680507ad63d3af583f6a4ffe641a563fd3c8040146

    • SHA512

      d2ecae3c0451ebc51e40900690eae81a5ee2773bf1e0e1ce005d541aa989b7dfe50d35bc0f4f9fb08d5c3ce3b6f8b2b8451f2791ef1cd84547354b5567b92503

    • SSDEEP

      6144:zmqMCYsOIVd8L0asTL+X2ihIPIYAOuKcP5WI0OYcd:zmlJs4sPxncRWrOTd

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (52) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks