General

  • Target

    2519f67fd922293420bd74a8f64fb45ef698fe8ac2ca672e2db56989eabce0d0.exe

  • Size

    563KB

  • Sample

    241120-dvpr9avjck

  • MD5

    e5cb1dc606511dd2cbdacd9b21cb664e

  • SHA1

    870b76e285207f1339c5f9fe057cad2705421d3a

  • SHA256

    2519f67fd922293420bd74a8f64fb45ef698fe8ac2ca672e2db56989eabce0d0

  • SHA512

    1b3cfc80144c64e717fd419ae0655eb598228f83ae83cfe40727056096cab7499962f5ee9ab8c910c94bf5d9782cd9a5a2e513ff704c48aeb4d9d03cf8fc3d91

  • SSDEEP

    12288:XQV9ht+XH2ZVUrmrrS26GvoGOrOBfLbCStJH9qS7gFD5CfuUQPBBCIR:XQV97V60K8LbJtnrkFD5CfubBBvR

Malware Config

Targets

    • Target

      2519f67fd922293420bd74a8f64fb45ef698fe8ac2ca672e2db56989eabce0d0.exe

    • Size

      563KB

    • MD5

      e5cb1dc606511dd2cbdacd9b21cb664e

    • SHA1

      870b76e285207f1339c5f9fe057cad2705421d3a

    • SHA256

      2519f67fd922293420bd74a8f64fb45ef698fe8ac2ca672e2db56989eabce0d0

    • SHA512

      1b3cfc80144c64e717fd419ae0655eb598228f83ae83cfe40727056096cab7499962f5ee9ab8c910c94bf5d9782cd9a5a2e513ff704c48aeb4d9d03cf8fc3d91

    • SSDEEP

      12288:XQV9ht+XH2ZVUrmrrS26GvoGOrOBfLbCStJH9qS7gFD5CfuUQPBBCIR:XQV97V60K8LbJtnrkFD5CfubBBvR

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (87) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks