General

  • Target

    StarRailBase.dll

  • Size

    4KB

  • Sample

    240905-nx575azdpq

  • MD5

    f1d1dbddc2ff603b0d58dd969e0a24a8

  • SHA1

    4527b754718e9767ad0a1b4051544e23494ff511

  • SHA256

    801b0b95527f98b1e5de4f92886e355ebe548c74257e736727c88c7507203b28

  • SHA512

    2eb669ddcfafb1fdd973101b7575902ee2b82b40cb4836c0a84430d86672ceb9040139513b3d17c2cd5ab0d9dbc4f99df745ed461648a345cc13fbab1216eb1c

  • SSDEEP

    48:qZITVmb0V3vYQ/qpUE474DMxdkCFZPSPeJeg:BTVmbK/mAsMxd3Ag

Malware Config

Targets

    • Target

      StarRailBase.dll

    • Size

      4KB

    • MD5

      f1d1dbddc2ff603b0d58dd969e0a24a8

    • SHA1

      4527b754718e9767ad0a1b4051544e23494ff511

    • SHA256

      801b0b95527f98b1e5de4f92886e355ebe548c74257e736727c88c7507203b28

    • SHA512

      2eb669ddcfafb1fdd973101b7575902ee2b82b40cb4836c0a84430d86672ceb9040139513b3d17c2cd5ab0d9dbc4f99df745ed461648a345cc13fbab1216eb1c

    • SSDEEP

      48:qZITVmb0V3vYQ/qpUE474DMxdkCFZPSPeJeg:BTVmbK/mAsMxd3Ag

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Renames multiple (711) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks