General

  • Target

    4395642dc571cb7612bf6836bde3c12bf254df0a4367eb169ea28cde323353e0

  • Size

    202KB

  • Sample

    240927-ztm3xs1hja

  • MD5

    61f46618f79003c83519b350a45ea8f5

  • SHA1

    45f2f10e42cb9844f77521c5f5761d88e77d56a3

  • SHA256

    4395642dc571cb7612bf6836bde3c12bf254df0a4367eb169ea28cde323353e0

  • SHA512

    96be1333850025569a25902c9dda6e2cf17e8c0091550e87c173a02630e6fc26773e451b3f69726faff9c924b214960b437d69d598db64db1bcc69838d582768

  • SSDEEP

    3072:85xDyM7XHLzkWOONsTLPxwUwGdRx/xAxnxpx9xSxvxvxNxzsC6PLwZr9LnKoI9Rn:83yMT7OONGR6Epn1I6xFem4wU

Malware Config

Targets

    • Target

      4395642dc571cb7612bf6836bde3c12bf254df0a4367eb169ea28cde323353e0

    • Size

      202KB

    • MD5

      61f46618f79003c83519b350a45ea8f5

    • SHA1

      45f2f10e42cb9844f77521c5f5761d88e77d56a3

    • SHA256

      4395642dc571cb7612bf6836bde3c12bf254df0a4367eb169ea28cde323353e0

    • SHA512

      96be1333850025569a25902c9dda6e2cf17e8c0091550e87c173a02630e6fc26773e451b3f69726faff9c924b214960b437d69d598db64db1bcc69838d582768

    • SSDEEP

      3072:85xDyM7XHLzkWOONsTLPxwUwGdRx/xAxnxpx9xSxvxvxNxzsC6PLwZr9LnKoI9Rn:83yMT7OONGR6Epn1I6xFem4wU

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (78) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks