General

  • Target

    878620ee8c892971d83f1317748b51cc8f6ecc1ca553269316697d75c4e9f4c4.exe

  • Size

    568KB

  • Sample

    241120-wh58ks1drm

  • MD5

    526c483a3dad08a67e3eabfcdf07135b

  • SHA1

    9cc2d2cc813731ac53ccbd2fd4219184fc1f2b74

  • SHA256

    878620ee8c892971d83f1317748b51cc8f6ecc1ca553269316697d75c4e9f4c4

  • SHA512

    c17896d7d354c20339cd7995f8881b8e6b0b1cba5d7947fbfbac167de0e566ed4f922bfe92ce49e7ccdec295e7250a9f4d7ff7eadcc646a29b116f21dbb2ce1e

  • SSDEEP

    12288:eaO2vM3cO60U7cxpmon4uuWlP5jqVvGY/7Oa4l5rikIo3:eaWbdQuMonflP5GvH/7z4lpikIO

Malware Config

Targets

    • Target

      878620ee8c892971d83f1317748b51cc8f6ecc1ca553269316697d75c4e9f4c4.exe

    • Size

      568KB

    • MD5

      526c483a3dad08a67e3eabfcdf07135b

    • SHA1

      9cc2d2cc813731ac53ccbd2fd4219184fc1f2b74

    • SHA256

      878620ee8c892971d83f1317748b51cc8f6ecc1ca553269316697d75c4e9f4c4

    • SHA512

      c17896d7d354c20339cd7995f8881b8e6b0b1cba5d7947fbfbac167de0e566ed4f922bfe92ce49e7ccdec295e7250a9f4d7ff7eadcc646a29b116f21dbb2ce1e

    • SSDEEP

      12288:eaO2vM3cO60U7cxpmon4uuWlP5jqVvGY/7Oa4l5rikIo3:eaWbdQuMonflP5GvH/7z4lpikIO

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (76) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks