General

  • Target

    fb842067a75854d866b813782d577a0a437fa1a94cefb29474f54177ca2fa483N.exe

  • Size

    140KB

  • Sample

    241122-m2vrhsyrcw

  • MD5

    9dd77124abfc0df88d77ef9826437ea0

  • SHA1

    42f21ae1c0eca6ccb9d706e1088a95871cb7aae6

  • SHA256

    fb842067a75854d866b813782d577a0a437fa1a94cefb29474f54177ca2fa483

  • SHA512

    780d8d63e2f4811f2526dcf040949199fe524a60d447c20a5e87c0741f75a01741c0d3f9d81b78a6af413527fe7df72f325295f828432f19c2a109e4340fc69e

  • SSDEEP

    3072:yb0pbi6mgeKIr8Sp9CO6MyurEzKr9gjssZclv2MyygJNDgDbKob7Tav:yd6CK49FvydzKr9gXGzIgSQU

Malware Config

Targets

    • Target

      fb842067a75854d866b813782d577a0a437fa1a94cefb29474f54177ca2fa483N.exe

    • Size

      140KB

    • MD5

      9dd77124abfc0df88d77ef9826437ea0

    • SHA1

      42f21ae1c0eca6ccb9d706e1088a95871cb7aae6

    • SHA256

      fb842067a75854d866b813782d577a0a437fa1a94cefb29474f54177ca2fa483

    • SHA512

      780d8d63e2f4811f2526dcf040949199fe524a60d447c20a5e87c0741f75a01741c0d3f9d81b78a6af413527fe7df72f325295f828432f19c2a109e4340fc69e

    • SSDEEP

      3072:yb0pbi6mgeKIr8Sp9CO6MyurEzKr9gjssZclv2MyygJNDgDbKob7Tav:yd6CK49FvydzKr9gXGzIgSQU

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (88) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks