General

  • Target

    e8e50f8e8c3f7e7ec8a40eba7414b7ab.zip

  • Size

    141KB

  • Sample

    240903-flrllaxfnp

  • MD5

    4053d12caf8a01ceda7d8fe00f8c3d8d

  • SHA1

    8cb120e7dcf089cb6454ed7bb1e7c5c330c3e97c

  • SHA256

    3d5d775ae8524bdfe810fc41b44f3d40a89ee32a06985c38eeb2e4f35670c5b6

  • SHA512

    8797b8a30182dc26be9af1a589c0171452c901de9384177004947d362b9ef776f5321a4e2e59f140cb6a669e45666186199fbc1e07b76c056b5f816124845e15

  • SSDEEP

    3072:xHdeQIPunXoNNpp9BOqDnjkd0AWC+9GICul5DJWdqtF4/Ef1Sb:x9eQhXoNPp9BVfkiAWC+9GI971Wjstg

Malware Config

Targets

    • Target

      a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0

    • Size

      208KB

    • MD5

      e8e50f8e8c3f7e7ec8a40eba7414b7ab

    • SHA1

      69fd0c614bcd2616cddb7d8c98dd50aa82f744ae

    • SHA256

      a6f7a6e87bacfb38f63af467530d6e0d1ff2a4a4ed9a7a32063920a67b0057d0

    • SHA512

      6f8309c5de3b6f031587808c0c8bd9ae582fda9882edf4c50bd366b34b5359b625604f07ac9e67e0e7c4ecaa5158fe6e869faa81282d14db7953f178e661bfe9

    • SSDEEP

      6144:nKgKrD7EJBNn4uQkKNLjnWYIKbkqu9aSN:nHi8BNn4uTKNPWYI1uk

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (79) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks