General

  • Target

    84c88686a52f325a239aec45635ec9adc85bfabcb9888658eecbca1bd9757a7b.exe

  • Size

    34KB

  • Sample

    200420-k5a1rczmbj

  • MD5

    fcf5c8e8a180c66e15ea22128dd0adfb

  • SHA1

    d4f0c114ffe12e343739fb837d24dc31dfab985c

  • SHA256

    84c88686a52f325a239aec45635ec9adc85bfabcb9888658eecbca1bd9757a7b

  • SHA512

    f06645c73bfc87061c4561b8cacb6c782493e5d39cd29971d71b0c38578296b81f9c2b54ca0415e15e5fd49755b7fa612f244b9e68fe8f21fc9db60c5f89b2e9

Malware Config

Targets

    • Target

      84c88686a52f325a239aec45635ec9adc85bfabcb9888658eecbca1bd9757a7b.exe

    • Size

      34KB

    • MD5

      fcf5c8e8a180c66e15ea22128dd0adfb

    • SHA1

      d4f0c114ffe12e343739fb837d24dc31dfab985c

    • SHA256

      84c88686a52f325a239aec45635ec9adc85bfabcb9888658eecbca1bd9757a7b

    • SHA512

      f06645c73bfc87061c4561b8cacb6c782493e5d39cd29971d71b0c38578296b81f9c2b54ca0415e15e5fd49755b7fa612f244b9e68fe8f21fc9db60c5f89b2e9

    • T1Happy

      T1Happy ransomware is a cryptovirus that behaves different than its counterparts.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Drops startup file

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run entry to start application

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks