General

  • Target

    gtm[1].js

  • Size

    225KB

  • Sample

    241219-qakn1stpfk

  • MD5

    5e309139bab9742d873df61f3387db70

  • SHA1

    3f82d8cbaacbf1e89f3e49fe5fe7e6ab71c2f556

  • SHA256

    faebb302785d86b52bf3ae2cc93c17df4d9af528b415911aa97a32a393a5dbed

  • SHA512

    6ae542caf1672e60b51cdcbbe0155de507fae7b6f90fe515b272f5a257551a77c5d897fb5c0f301be24b63c4d1a7ed6656aa15b7b8cb4da0e25c091206bf3a65

  • SSDEEP

    3072:eMZFrjSUizzAuL0iJRKsRm1t6hTf/9q9bdTOmQyDy4AVrv8Hea:zGUiz8biZD989OmQyDy4e8Hr

Malware Config

Targets

    • Target

      gtm[1].js

    • Size

      225KB

    • MD5

      5e309139bab9742d873df61f3387db70

    • SHA1

      3f82d8cbaacbf1e89f3e49fe5fe7e6ab71c2f556

    • SHA256

      faebb302785d86b52bf3ae2cc93c17df4d9af528b415911aa97a32a393a5dbed

    • SHA512

      6ae542caf1672e60b51cdcbbe0155de507fae7b6f90fe515b272f5a257551a77c5d897fb5c0f301be24b63c4d1a7ed6656aa15b7b8cb4da0e25c091206bf3a65

    • SSDEEP

      3072:eMZFrjSUizzAuL0iJRKsRm1t6hTf/9q9bdTOmQyDy4AVrv8Hea:zGUiz8biZD989OmQyDy4e8Hr

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Dharma family

    • Modifies visibility of file extensions in Explorer

    • Troldesh family

    • Troldesh, Shade, Encoder.858

      Troldesh is a ransomware spread by malspam.

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (552) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • A potential corporate email address has been identified in the URL: [email protected]

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks