General

  • Target

    wtava.zip

  • Size

    467KB

  • Sample

    200621-wraj43zgpa

  • MD5

    77672b424b2890a77c18a5ec09a8f21c

  • SHA1

    c48060eb19c19e9b009167158e03dce0c5bde83c

  • SHA256

    0f1bf8c193b4aa0ec51cbcfe3fa36188c0479291df077ed0ffe37d78db8eaf6f

  • SHA512

    e48f1dbc4148d64045d04f1b53ced5f39146e82115bdeefa2aa4a895f913952fde360ecafb3996ca1e7a456574d276ca6ba4eb10f0e425b905fcca345b987d2c

Malware Config

Targets

    • Target

      wtava.bin

    • Size

      1.1MB

    • MD5

      6c660f960daac148be75427c712d0134

    • SHA1

      b3c597060abc20d3b3291f8b5252a3834d49b92f

    • SHA256

      fa4626e2c5984d7868a685c5102530bd8260d0b31ef06d2ce2da7636da48d2d6

    • SHA512

      48806df9787497cbf55a85a523c8e703aec1bb262c60a019ab45f420a87d016054a97dc428484bd5c2f7ba1c3f57a37d807fc4e1de487dbef1c76dc38fbf8fe0

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Adds Run entry to start application

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies service

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.