General

  • Target

    2024-09-29_f47313d903d4a4bcf067567fe0d43817_ryuk

  • Size

    6.7MB

  • Sample

    240929-xg6ndszcje

  • MD5

    f47313d903d4a4bcf067567fe0d43817

  • SHA1

    08516b4b77454dd4f948084308453d6619d94009

  • SHA256

    9c987ba5a2af23422f773779a1b2f492617b8f6e68dba5b4e5684b2152bc6d4b

  • SHA512

    dce19db50819af430c979a30b0afdc6b48d1b501325f492fb105384039a9eef90d1479284e5c5542b9a3be9d8ec60c4416cc125cbad8c007e0f54ae312179a74

  • SSDEEP

    98304:3ijHdPkLq3Gknso4mDTGVCkaTdKiySh41U4WyBuQhoBCIS+Y:30eL0wcKfSB4WyMQmYI

Malware Config

Targets

    • Target

      2024-09-29_f47313d903d4a4bcf067567fe0d43817_ryuk

    • Size

      6.7MB

    • MD5

      f47313d903d4a4bcf067567fe0d43817

    • SHA1

      08516b4b77454dd4f948084308453d6619d94009

    • SHA256

      9c987ba5a2af23422f773779a1b2f492617b8f6e68dba5b4e5684b2152bc6d4b

    • SHA512

      dce19db50819af430c979a30b0afdc6b48d1b501325f492fb105384039a9eef90d1479284e5c5542b9a3be9d8ec60c4416cc125cbad8c007e0f54ae312179a74

    • SSDEEP

      98304:3ijHdPkLq3Gknso4mDTGVCkaTdKiySh41U4WyBuQhoBCIS+Y:30eL0wcKfSB4WyMQmYI

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks