General

  • Target

    3c01792ee255068f02a0fa3164e4c72f30b0e36c790699a7b93ccbc220b8b541N

  • Size

    211KB

  • Sample

    240927-hnnzlatbjg

  • MD5

    dd82fd67de555c611e2513dcaa80a4b0

  • SHA1

    91a2024a0c6b8d6ac2ca383458d19a556ccd2879

  • SHA256

    3c01792ee255068f02a0fa3164e4c72f30b0e36c790699a7b93ccbc220b8b541

  • SHA512

    bd856cf8b4656c14d37cb901f3f78a862ff92ccf412c694850c2025b591616890114f5dd8036fb747c89b8fcd643eec9b6144e79e5e5c5a72cc210e588507af7

  • SSDEEP

    6144:k9NbYFEgTM8zbtr141Tt725mkHDs6ues+bcQX:k7+nzbtJWT45mkHSmcQX

Malware Config

Targets

    • Target

      3c01792ee255068f02a0fa3164e4c72f30b0e36c790699a7b93ccbc220b8b541N

    • Size

      211KB

    • MD5

      dd82fd67de555c611e2513dcaa80a4b0

    • SHA1

      91a2024a0c6b8d6ac2ca383458d19a556ccd2879

    • SHA256

      3c01792ee255068f02a0fa3164e4c72f30b0e36c790699a7b93ccbc220b8b541

    • SHA512

      bd856cf8b4656c14d37cb901f3f78a862ff92ccf412c694850c2025b591616890114f5dd8036fb747c89b8fcd643eec9b6144e79e5e5c5a72cc210e588507af7

    • SSDEEP

      6144:k9NbYFEgTM8zbtr141Tt725mkHDs6ues+bcQX:k7+nzbtJWT45mkHSmcQX

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (54) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks