General

  • Target

    FreeWill.exe

  • Size

    7.1MB

  • Sample

    250402-vegkdazyft

  • MD5

    4318d93e4b3d3590f3b4c6c2cdd794f3

  • SHA1

    166c8a860d24671c6236944d32f5713a91449893

  • SHA256

    ebbb8769086dcf3f7bdaf9366cf6a5ac4c5ac981e4be3c69d08ce06fc80c2f28

  • SHA512

    291b8fa416147008a6c703d1cae0006f26b91b1561e6919208bdf329622c1f1137bd7dad3f4f2707c33241db93d243ded74317aa7cb1bccfdb6926057f5413da

  • SSDEEP

    196608:JOoKoTbXauPIo+8izlrAjDCbXauPIo+8iAo:XlT70Rcu7M

Malware Config

Targets

    • Target

      FreeWill.exe

    • Size

      7.1MB

    • MD5

      4318d93e4b3d3590f3b4c6c2cdd794f3

    • SHA1

      166c8a860d24671c6236944d32f5713a91449893

    • SHA256

      ebbb8769086dcf3f7bdaf9366cf6a5ac4c5ac981e4be3c69d08ce06fc80c2f28

    • SHA512

      291b8fa416147008a6c703d1cae0006f26b91b1561e6919208bdf329622c1f1137bd7dad3f4f2707c33241db93d243ded74317aa7cb1bccfdb6926057f5413da

    • SSDEEP

      196608:JOoKoTbXauPIo+8izlrAjDCbXauPIo+8iAo:XlT70Rcu7M

    • Modifies WinLogon for persistence

    • Modifies Windows Defender DisableAntiSpyware settings

    • Renames multiple (1003) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks