General

  • Target

    f12a88f032fd94b4bb43496d87a63ad30ae57202738809c0de90a5e44003c8ea

  • Size

    158KB

  • Sample

    241026-fhy69s1fjm

  • MD5

    c3606922a5b1eb3004a97e8ef42d1ba7

  • SHA1

    b3b1f39824be60ad75a43fcb225bfbf17df98350

  • SHA256

    f12a88f032fd94b4bb43496d87a63ad30ae57202738809c0de90a5e44003c8ea

  • SHA512

    80053bb1616901715959a6234d783f790105e11898c523c2c699294c95fecbd20ef9e58c7080dcbc2a87e1f33521e2ea669f85a359ba4e0ace24864bebc1560b

  • SSDEEP

    3072:bvBqDw2qQ/sxzLm2rltanVH54IROC4RM7aEFpBNIPA95F1E06s+cCGNI:bZfu4XPZtaNmIROPR5EzBfnC0ocC8I

Malware Config

Targets

    • Target

      f12a88f032fd94b4bb43496d87a63ad30ae57202738809c0de90a5e44003c8ea

    • Size

      158KB

    • MD5

      c3606922a5b1eb3004a97e8ef42d1ba7

    • SHA1

      b3b1f39824be60ad75a43fcb225bfbf17df98350

    • SHA256

      f12a88f032fd94b4bb43496d87a63ad30ae57202738809c0de90a5e44003c8ea

    • SHA512

      80053bb1616901715959a6234d783f790105e11898c523c2c699294c95fecbd20ef9e58c7080dcbc2a87e1f33521e2ea669f85a359ba4e0ace24864bebc1560b

    • SSDEEP

      3072:bvBqDw2qQ/sxzLm2rltanVH54IROC4RM7aEFpBNIPA95F1E06s+cCGNI:bZfu4XPZtaNmIROPR5EzBfnC0ocC8I

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (83) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks