General

  • Target

    aa0dbc871c409100c8c817383a176fd2dae2b495a654a0d00851ebbc615aceb4

  • Size

    12KB

  • Sample

    241102-q3xt2synbn

  • MD5

    811de651e578578df251f2600a4cf96d

  • SHA1

    452096d7b12a25f91e3b07154d713111abf24dec

  • SHA256

    aa0dbc871c409100c8c817383a176fd2dae2b495a654a0d00851ebbc615aceb4

  • SHA512

    9f37bb1df025ee7934976b96b1da84ad869098df777b03e0237a2656ae00166adc29f65d58b75de73e350a598d0a840cdf64dd900abd07b2825d3f8ff20d298f

  • SSDEEP

    192:e/TrG62a6B10k3g4fXk1iTV3HGc7EkpAqEjvu2q9C/YpXnAITZfPtRMC5Q0Je:eebFNw4Pk1itKkpAjjI2YpdmC5Q

Malware Config

Targets

    • Target

      aa0dbc871c409100c8c817383a176fd2dae2b495a654a0d00851ebbc615aceb4

    • Size

      12KB

    • MD5

      811de651e578578df251f2600a4cf96d

    • SHA1

      452096d7b12a25f91e3b07154d713111abf24dec

    • SHA256

      aa0dbc871c409100c8c817383a176fd2dae2b495a654a0d00851ebbc615aceb4

    • SHA512

      9f37bb1df025ee7934976b96b1da84ad869098df777b03e0237a2656ae00166adc29f65d58b75de73e350a598d0a840cdf64dd900abd07b2825d3f8ff20d298f

    • SSDEEP

      192:e/TrG62a6B10k3g4fXk1iTV3HGc7EkpAqEjvu2q9C/YpXnAITZfPtRMC5Q0Je:eebFNw4Pk1itKkpAjjI2YpdmC5Q

    • Renames multiple (2214) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops file in Drivers directory

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks