General

  • Target

    main.exe

  • Size

    39.3MB

  • Sample

    241227-z13ryszmds

  • MD5

    e3c53e4f05fc456e1cad2fbd4fa14873

  • SHA1

    c8f5381de7e4af2efb7511346425f68166033f04

  • SHA256

    0bb58e091494ae84d52df4041b1fe2f01e18b5a1dcabef1c6362abf37a95836f

  • SHA512

    9c4e92336458e88dce984b31838db7780bb427426d6a6a500bc5b7f7c6517449ba99bd5f04bae4a095ffbd256016726df45665610cca94075f2d5ff9b7433ac9

  • SSDEEP

    786432:l9YidhvMkqW8rK1QtICrhHJ5da8DZcUThl8Esx6fg0dQfUsoIhjCQerR6vp:l9JbqW9iICrhDI61AJ4g0GUlIY6v

Malware Config

Targets

    • Target

      main.exe

    • Size

      39.3MB

    • MD5

      e3c53e4f05fc456e1cad2fbd4fa14873

    • SHA1

      c8f5381de7e4af2efb7511346425f68166033f04

    • SHA256

      0bb58e091494ae84d52df4041b1fe2f01e18b5a1dcabef1c6362abf37a95836f

    • SHA512

      9c4e92336458e88dce984b31838db7780bb427426d6a6a500bc5b7f7c6517449ba99bd5f04bae4a095ffbd256016726df45665610cca94075f2d5ff9b7433ac9

    • SSDEEP

      786432:l9YidhvMkqW8rK1QtICrhHJ5da8DZcUThl8Esx6fg0dQfUsoIhjCQerR6vp:l9JbqW9iICrhDI61AJ4g0GUlIY6v

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables cmd.exe use via registry modification

    • Drops file in Drivers directory

    • Possible privilege escalation attempt

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks