General

  • Target

    Screenshot 2024-11-15 12.46.42 PM.png

  • Size

    229B

  • Sample

    241115-xfcc6aymht

  • MD5

    e34a2a74a48dc57fb67ee665bc837ba3

  • SHA1

    580b5b5d6dc5d17a50a8ae08473bfed3cdfdd608

  • SHA256

    07a90755798be371ecf9a8c6a12ffb8783f8e3754abfe618c5e8410cef1b3cdc

  • SHA512

    db41adbf69f4e25a8cde03c6a8116121a7bd89316ccdfe95d50c73605bf84b8f0db4a3a3421e968027a5777527e40f29ff60b60edac8855464333ede98175889

Malware Config

Targets

    • Target

      Screenshot 2024-11-15 12.46.42 PM.png

    • Size

      229B

    • MD5

      e34a2a74a48dc57fb67ee665bc837ba3

    • SHA1

      580b5b5d6dc5d17a50a8ae08473bfed3cdfdd608

    • SHA256

      07a90755798be371ecf9a8c6a12ffb8783f8e3754abfe618c5e8410cef1b3cdc

    • SHA512

      db41adbf69f4e25a8cde03c6a8116121a7bd89316ccdfe95d50c73605bf84b8f0db4a3a3421e968027a5777527e40f29ff60b60edac8855464333ede98175889

    • Renames multiple (51) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Downloads MZ/PE file

    • A potential corporate email address has been identified in the URL: [email protected]

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Detected potential entity reuse from brand STEAM.

MITRE ATT&CK Enterprise v15

Tasks