General

  • Target

    2024-10-11_ec105a10fbc6340a69581f36454d722f_bkransomware

  • Size

    6.6MB

  • Sample

    241011-2bystaxdkb

  • MD5

    ec105a10fbc6340a69581f36454d722f

  • SHA1

    744eaf350ae3aa2865bc5bce43b72f5c0e6ab5c7

  • SHA256

    12405a7f8f62a12fbfb93668c5d1314c88440eb9e11e37933a31d98fa73a11f6

  • SHA512

    d6c5833510e50390a90a35329a30bf80af3909f871a00731dc7bfdfaea803e28929440853d106ed157431cabf3e5d5feed5635f360e02e32113c9ec87d000d59

  • SSDEEP

    196608:66ABZOhEyu0HDsqhU8gccZ6Limi6rHTZTBq+djV:cOhEyFoq0R6Limb1B5

Malware Config

Targets

    • Target

      2024-10-11_ec105a10fbc6340a69581f36454d722f_bkransomware

    • Size

      6.6MB

    • MD5

      ec105a10fbc6340a69581f36454d722f

    • SHA1

      744eaf350ae3aa2865bc5bce43b72f5c0e6ab5c7

    • SHA256

      12405a7f8f62a12fbfb93668c5d1314c88440eb9e11e37933a31d98fa73a11f6

    • SHA512

      d6c5833510e50390a90a35329a30bf80af3909f871a00731dc7bfdfaea803e28929440853d106ed157431cabf3e5d5feed5635f360e02e32113c9ec87d000d59

    • SSDEEP

      196608:66ABZOhEyu0HDsqhU8gccZ6Limi6rHTZTBq+djV:cOhEyFoq0R6Limb1B5

    • Modifies Windows Defender Real-time Protection settings

    • Windows security bypass

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Indirect Command Execution

      Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks