General

  • Target

    dabf78f80ff2c1cfe3fc390d17db170a7e3ab57f159460832fb4dfe4c969cb0a.exe

  • Size

    139KB

  • Sample

    241122-y71eqstrfl

  • MD5

    41272feb0d8ad0031b602f8ad0404939

  • SHA1

    5f3c34d478ed42f9077c9b7d520701cfb23fc24a

  • SHA256

    dabf78f80ff2c1cfe3fc390d17db170a7e3ab57f159460832fb4dfe4c969cb0a

  • SHA512

    38d677f00a1a1193deedf08c9752f6ce97424c034edad6c81ccb2e9c4185e5e8111410d9d3f4587fc57b65e6d7eaa0a6a4e6ff3862a7504a30fa0c8d74b8c671

  • SSDEEP

    3072:1SJwBYmXsjBH9Vi2wMnm1NfXKvBLCfbPqqqJvEw8xJpH:1Sis5FnyXSBL0bCzd8x/

Malware Config

Targets

    • Target

      dabf78f80ff2c1cfe3fc390d17db170a7e3ab57f159460832fb4dfe4c969cb0a.exe

    • Size

      139KB

    • MD5

      41272feb0d8ad0031b602f8ad0404939

    • SHA1

      5f3c34d478ed42f9077c9b7d520701cfb23fc24a

    • SHA256

      dabf78f80ff2c1cfe3fc390d17db170a7e3ab57f159460832fb4dfe4c969cb0a

    • SHA512

      38d677f00a1a1193deedf08c9752f6ce97424c034edad6c81ccb2e9c4185e5e8111410d9d3f4587fc57b65e6d7eaa0a6a4e6ff3862a7504a30fa0c8d74b8c671

    • SSDEEP

      3072:1SJwBYmXsjBH9Vi2wMnm1NfXKvBLCfbPqqqJvEw8xJpH:1Sis5FnyXSBL0bCzd8x/

    • Modifies visibility of file extensions in Explorer

    • UAC bypass

    • Renames multiple (83) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks