General
-
Target
Slam Ransomware Builder.exe
-
Size
45.2MB
-
Sample
241113-mjyqfszhpj
-
MD5
47e59722cd9850f1b880e8b609451794
-
SHA1
0e0447dbbcf333c692a09af6f7e46c0c80767395
-
SHA256
feac51e6fa0f258fe8865c1f55f893bcfe7527c8e013fe36034abf7e2bc86d72
-
SHA512
342f92cde3dd438299a142f4efe2e4c576761a968064c6caf48b5fa0550d59b4d37a7e00dae15f70dffe6d50b3753505e9351dcb52f1c82b601437e18d0d1f95
-
SSDEEP
786432:cP8GvbAwd62IMqswd/VWZv7Ed9eVuVIufGoFGH3b98bUhwKkeA:cLpIppav7EdEIVIVoQH3ZOUhwKU
Behavioral task
behavioral1
Sample
Slam Ransomware Builder.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
��U��D%.pyc
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
Slam Ransomware Builder.exe
-
Size
45.2MB
-
MD5
47e59722cd9850f1b880e8b609451794
-
SHA1
0e0447dbbcf333c692a09af6f7e46c0c80767395
-
SHA256
feac51e6fa0f258fe8865c1f55f893bcfe7527c8e013fe36034abf7e2bc86d72
-
SHA512
342f92cde3dd438299a142f4efe2e4c576761a968064c6caf48b5fa0550d59b4d37a7e00dae15f70dffe6d50b3753505e9351dcb52f1c82b601437e18d0d1f95
-
SSDEEP
786432:cP8GvbAwd62IMqswd/VWZv7Ed9eVuVIufGoFGH3b98bUhwKkeA:cLpIppav7EdEIVIVoQH3ZOUhwKU
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
-
-
Target
��U��D%.pyc
-
Size
857B
-
MD5
4fc98f1a46982f39f8d785192f96b9ee
-
SHA1
0303c84c7ee8a1cbf7c891e9999e10df300a86b5
-
SHA256
6b66f09a11387a5ac9110cee6d4254db1d1462e5fd0f7e2da757420b168054d4
-
SHA512
82e9ecda0e2a4c3fd04e16ec584d8a911d8048c9bb2f191fe6de5ada4e976721c42a16f84498576c93141dceb39b6dc085edc7cacc3b454d7af7b832734f3d1b
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Process Discovery
1Query Registry
4System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1