General

  • Target

    f188cf267d209a0209a25bda4bb75b86.exe

  • Size

    43KB

  • Sample

    200724-15z7parj4x

  • MD5

    f188cf267d209a0209a25bda4bb75b86

  • SHA1

    3ef4c199d1b5187784f4d709ab8e1cc6901716e8

  • SHA256

    027d99aaaa6803a07d07ce0ba1fa66964388129d3b26dcf8621a3310692b0a61

  • SHA512

    abe64e07cb279dad66df081d0f374f2948fec444872f09fb968de6b74848414ab354c27598475d919d8a48670e4b42a75eadd6392a550fb727d8422324a9c535

Malware Config

Targets

    • Target

      f188cf267d209a0209a25bda4bb75b86.exe

    • Size

      43KB

    • MD5

      f188cf267d209a0209a25bda4bb75b86

    • SHA1

      3ef4c199d1b5187784f4d709ab8e1cc6901716e8

    • SHA256

      027d99aaaa6803a07d07ce0ba1fa66964388129d3b26dcf8621a3310692b0a61

    • SHA512

      abe64e07cb279dad66df081d0f374f2948fec444872f09fb968de6b74848414ab354c27598475d919d8a48670e4b42a75eadd6392a550fb727d8422324a9c535

    • Exorcist

      Ransomware-as-a-service which avoids infecting machines in CIS nations. First seen in mid-2020.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Deletes itself

    • Enumerates connected drives

    • Modifies service

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Defacement

1
T1491

Tasks