General

  • Target

    Slam Ransomware Builder.exe

  • Size

    45.2MB

  • Sample

    241113-mjyqfszhpj

  • MD5

    47e59722cd9850f1b880e8b609451794

  • SHA1

    0e0447dbbcf333c692a09af6f7e46c0c80767395

  • SHA256

    feac51e6fa0f258fe8865c1f55f893bcfe7527c8e013fe36034abf7e2bc86d72

  • SHA512

    342f92cde3dd438299a142f4efe2e4c576761a968064c6caf48b5fa0550d59b4d37a7e00dae15f70dffe6d50b3753505e9351dcb52f1c82b601437e18d0d1f95

  • SSDEEP

    786432:cP8GvbAwd62IMqswd/VWZv7Ed9eVuVIufGoFGH3b98bUhwKkeA:cLpIppav7EdEIVIVoQH3ZOUhwKU

Malware Config

Targets

    • Target

      Slam Ransomware Builder.exe

    • Size

      45.2MB

    • MD5

      47e59722cd9850f1b880e8b609451794

    • SHA1

      0e0447dbbcf333c692a09af6f7e46c0c80767395

    • SHA256

      feac51e6fa0f258fe8865c1f55f893bcfe7527c8e013fe36034abf7e2bc86d72

    • SHA512

      342f92cde3dd438299a142f4efe2e4c576761a968064c6caf48b5fa0550d59b4d37a7e00dae15f70dffe6d50b3753505e9351dcb52f1c82b601437e18d0d1f95

    • SSDEEP

      786432:cP8GvbAwd62IMqswd/VWZv7Ed9eVuVIufGoFGH3b98bUhwKkeA:cLpIppav7EdEIVIVoQH3ZOUhwKU

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      ��U��D%.pyc

    • Size

      857B

    • MD5

      4fc98f1a46982f39f8d785192f96b9ee

    • SHA1

      0303c84c7ee8a1cbf7c891e9999e10df300a86b5

    • SHA256

      6b66f09a11387a5ac9110cee6d4254db1d1462e5fd0f7e2da757420b168054d4

    • SHA512

      82e9ecda0e2a4c3fd04e16ec584d8a911d8048c9bb2f191fe6de5ada4e976721c42a16f84498576c93141dceb39b6dc085edc7cacc3b454d7af7b832734f3d1b

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks