General

  • Target

    d5ab7010a6a344d1e596c2ee178a2a47b9a0c0fbe5de62623e5f46c111b0ec81

  • Size

    260KB

  • Sample

    240903-q2153szblh

  • MD5

    3275234b02e2a4847711d1896d72c8c9

  • SHA1

    e229f35e69839fde6ad545d7f052bc6526f6b4b2

  • SHA256

    d5ab7010a6a344d1e596c2ee178a2a47b9a0c0fbe5de62623e5f46c111b0ec81

  • SHA512

    f37688fad0ed70a3d809f14455f4db1b654e131b2f887b73edad63e583debb5a694fd848a152491e88d1bc90771852d76d777abb9ac75f0a5801d1bafc31c407

  • SSDEEP

    6144:ICb+tA44wqn/8ugs5EIrnvSmckPIZJ3QRAuJkzcTaOpNB:Jb+tA44ZES5hvttc3Q6uQcTjB

Malware Config

Targets

    • Target

      0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa

    • Size

      326KB

    • MD5

      98501f40768d2af42017c79368a0695b

    • SHA1

      20112e3e53f4443b18934ba8d60f513b28d14e60

    • SHA256

      0414dd47eec56f22bb4910e16ce7f92ac1eb8f8f06f2ad43fe0ac275c0e887fa

    • SHA512

      b8690d8a7c94fd5ba8e6f28c0cb241adeb2635cc2404ac6b6ff66044310ac09f584df8db693ff939bde6aaa991b01cd2427f8d7b47139faad9a7c3aa3ccb5acc

    • SSDEEP

      6144:yPUYxfzPba9h5MKajqBiUwzzHRyultSexze5QQhuYlwdhp4y9C6wOQhW8U9ETDRd:ZkbPbahMKajqUUwzzHRyultSexze5QQ9

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (61) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks