General

  • Target

    RNSM00471.7z

  • Size

    77.9MB

  • Sample

    240927-mdl5gaxfjj

  • MD5

    316fa4481b18d738d63477376675a281

  • SHA1

    1c0c3b8661e6033740b6d27021afabfd71f1fb13

  • SHA256

    7c4210c18bbe5b1af9000ae38953c5c52bfe5de023b640492d3f296d0f4caec4

  • SHA512

    260427131dc32da771c403848f51d64470897a39de37bbbae2964099b4b2ef2d4a099af66c3e4c7ef1f7eaaadddc970e71f0100b348502659bdeee50e2dfb1f0

  • SSDEEP

    1572864:yvUoQ9DhK3exOjITTZtcP2EeyBsFFYttMZfL1py:yvUoQphtcuMB6itOA

Malware Config

Targets

    • Target

      RNSM00471.7z

    • Size

      77.9MB

    • MD5

      316fa4481b18d738d63477376675a281

    • SHA1

      1c0c3b8661e6033740b6d27021afabfd71f1fb13

    • SHA256

      7c4210c18bbe5b1af9000ae38953c5c52bfe5de023b640492d3f296d0f4caec4

    • SHA512

      260427131dc32da771c403848f51d64470897a39de37bbbae2964099b4b2ef2d4a099af66c3e4c7ef1f7eaaadddc970e71f0100b348502659bdeee50e2dfb1f0

    • SSDEEP

      1572864:yvUoQ9DhK3exOjITTZtcP2EeyBsFFYttMZfL1py:yvUoQphtcuMB6itOA

    • AtomSilo

      Ransomware family first seen in September 2021.

    • AtomSilo Ransomware

    • Modifies WinLogon for persistence

    • Urelas

      Urelas is a trojan targeting card games.

    • VanillaRat

      VanillaRat is an advanced remote administration tool coded in C#.

    • Vanilla Rat payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks