General

  • Target

    ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN

  • Size

    196KB

  • Sample

    241002-brkysatfke

  • MD5

    bceb210f414ff6adfa63b6debe403510

  • SHA1

    18381302ef676cf5fb15a584c4a456ee175db313

  • SHA256

    ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16c

  • SHA512

    03893003199b087c508a4d141502ec1c60b831ae3a6bef6d92a898a5c8d4472aaee0e294eb469380c51a4cc19d077a5bae7f94aca8bf868f79fe4b9680116f18

  • SSDEEP

    3072:5vDJY/eWZqYauFiIfNLCqcyM99OqJ+jtYxpZ5nk7pztomi5BWzGmeWBRcIP6CwX:5qGW0Ts/NbcyU9XJ+jtYd5mBD6X4pn9

Malware Config

Targets

    • Target

      ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16cN

    • Size

      196KB

    • MD5

      bceb210f414ff6adfa63b6debe403510

    • SHA1

      18381302ef676cf5fb15a584c4a456ee175db313

    • SHA256

      ad7b3ddb555db2bc8b163f6543973ebce16d8377935130550248b6554d6de16c

    • SHA512

      03893003199b087c508a4d141502ec1c60b831ae3a6bef6d92a898a5c8d4472aaee0e294eb469380c51a4cc19d077a5bae7f94aca8bf868f79fe4b9680116f18

    • SSDEEP

      3072:5vDJY/eWZqYauFiIfNLCqcyM99OqJ+jtYxpZ5nk7pztomi5BWzGmeWBRcIP6CwX:5qGW0Ts/NbcyU9XJ+jtYd5mBD6X4pn9

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (54) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks