General

  • Target

    8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80.bin.gz

  • Size

    56KB

  • Sample

    200626-dmckdg1rd2

  • MD5

    0d244295a43bf3b705514e52415a1e64

  • SHA1

    722ac8d7dc788ae97a1eea66c2e80238c926dede

  • SHA256

    3505bc92994bc33ab71bfb458177e0b8c34c7d9aed7d75f23df261d08417a168

  • SHA512

    eff3b90bb6281a0616c4f100970e33483b86dc56846d68e2d4d0673c4b9aeb1d53413ea6901a526af4af5a265903d2ab3db1b084ba4d726635bce2d6357cd21f

Malware Config

Targets

    • Target

      sample

    • Size

      56KB

    • MD5

      ecb00e9a61f99a7d4c90723294986bbc

    • SHA1

      be59c867da75e2a66b8c2519e950254f817cd4ad

    • SHA256

      8897db876553f942b2eb4005f8475a232bafb82a50ca7761a621842e894a3d80

    • SHA512

      9dee79827d865de41a63962b419eed7e1f9610ff27f00f8b7b2b9f51e905d5db907d310da590d8f1a11ac88e549373edf39bffdb44d1b205728f1b5e0a43aa5e

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Possible privilege escalation attempt

    • Deletes itself

    • Loads dropped DLL

    • Modifies file permissions

    • Drops file in System32 directory

    • Modifies service

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Hidden Files and Directories

1
T1158

Defense Evasion

File Deletion

2
T1107

File Permissions Modification

1
T1222

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Impact

Inhibit System Recovery

2
T1490

Tasks