General

  • Target

    Bully تعريب لعبة.rar

  • Size

    95.5MB

  • Sample

    250328-ze1eps1vgv

  • MD5

    0e4628be434664acd066957e9b59397d

  • SHA1

    a48790125af557b454b79a76f9948f406dfbce17

  • SHA256

    b68804b0a0b8c8b09bb156f630ca71aeff435f493aaea99a24f2139c501a1fab

  • SHA512

    0f55e866ca82dccfb45d4119571f4c516a152a0140040372e3282d782b952a65414d7bcdfc353e24c26ab3f38bae54bea59fd2ead17642d81c87f41c19f1cc9e

  • SSDEEP

    1572864:drXuEi7O+eS5StbrPIDKfMfRddtvtuFTW3ChmvrT8akq5qtpBQ5GMJtB3IHEhEER:drXuEkeFJ8GfMJHtvgW3/vrTiqMpBQc6

Malware Config

Targets

    • Target

      Bully تعريب لعبة/ملف التعريب/SilentPatchBully.asi

    • Size

      113KB

    • MD5

      c854c8c64d7b398b1547b949edb062c7

    • SHA1

      4e29e8ab68a45c39e4347fb715b8a341654cf609

    • SHA256

      190e1a3d3eafc7d6d30a489d45e7b38265baed52966382f509017d3fc0e51c0a

    • SHA512

      b9c0535503847e01b2b282d29f773682b80209196651aa65207dd7364b55cb5be6c4b90e63829072090ab9804448250ef2572512adb1013d6168ea26f2118f82

    • SSDEEP

      3072:g4JNjeuSfd00Iy/xTH6rCHxna7/uuLU6CooaksfNgI/77d+P4V8:hNjcfdB/56mdINHV

    • Renames multiple (95) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks