5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367
1MB
200625-a7f1nq69h6
572fea5f025df78f2d316216fbeee52e
91b2bf44b1f9282c09f07f16631deaa3ad9d956d
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367
eb238272227c5825477ff1e37dc4f7e467665049d4db5649fff59c39d7745e88b06234d6d1218c05c802e33e21577f9d4a533cb9e23ebe6fb09654f97759c187
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367
572fea5f025df78f2d316216fbeee52e
1MB
91b2bf44b1f9282c09f07f16631deaa3ad9d956d
5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367
eb238272227c5825477ff1e37dc4f7e467665049d4db5649fff59c39d7745e88b06234d6d1218c05c802e33e21577f9d4a533cb9e23ebe6fb09654f97759c187
Tags
Signatures
-
Modifies service
-
Modifies file permissions
Tags
TTPs
-
Loads dropped DLL
-
Deletes shadow copies
Description
Ransomware often targets backup files to inhibit system recovery.
Tags
TTPs
-
Possible privilege escalation attempt
Tags
-
Executes dropped EXE
-
Deletes itself
-
Drops file in System32 directory