General

  • Target

    c98fbadad6784f4542ddff3a63c73f9133569ab6663d6ac0fc0543fafe6e3993N

  • Size

    6.7MB

  • Sample

    240920-frffhszdmg

  • MD5

    32e845f7459a02d026db70ca010ccc40

  • SHA1

    b3678082663c4cd21f50b354cd7556331abf7736

  • SHA256

    c98fbadad6784f4542ddff3a63c73f9133569ab6663d6ac0fc0543fafe6e3993

  • SHA512

    c2ecbf2cb686564752639c4b359ae9d909f83dcfc05c0fe258ceb4a0103efa5378b606bbb8d09e06dde7453da5c4d0d6a358510b819c20894eb74e6443df1477

  • SSDEEP

    49152:Kwi0L0q+wi0L0qR4wZB8NIM+B8NIMI8Sfpwotkzaxc1OGz88wk:Vi0fi0H4wmIMrIMzKpXOMGQ8wk

Malware Config

Targets

    • Target

      c98fbadad6784f4542ddff3a63c73f9133569ab6663d6ac0fc0543fafe6e3993N

    • Size

      6.7MB

    • MD5

      32e845f7459a02d026db70ca010ccc40

    • SHA1

      b3678082663c4cd21f50b354cd7556331abf7736

    • SHA256

      c98fbadad6784f4542ddff3a63c73f9133569ab6663d6ac0fc0543fafe6e3993

    • SHA512

      c2ecbf2cb686564752639c4b359ae9d909f83dcfc05c0fe258ceb4a0103efa5378b606bbb8d09e06dde7453da5c4d0d6a358510b819c20894eb74e6443df1477

    • SSDEEP

      49152:Kwi0L0q+wi0L0qR4wZB8NIM+B8NIMI8Sfpwotkzaxc1OGz88wk:Vi0fi0H4wmIMrIMzKpXOMGQ8wk

    • Modifies WinLogon for persistence

    • Renames multiple (91) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks