General

  • Target

    79385ed97732aee0036e67824de18e28.exe

  • Size

    43KB

  • Sample

    200724-64rls1gjl2

  • MD5

    79385ed97732aee0036e67824de18e28

  • SHA1

    2f65a2b8ac21b3505855f7b89551cc1f31bf636e

  • SHA256

    8d684a790a5683b8decde9fb5a819c4a164d3032723a151a30ff26d3c2b1aabf

  • SHA512

    db1d99884ab384ed571195e7c85105fe1f5bef2cb7e81f1f9380a8aef99f71e9d51a46e5ea6d81acee72aa2c2eb1b371cd11097678cbd27cfa0ef9b254630072

Malware Config

Targets

    • Target

      79385ed97732aee0036e67824de18e28.exe

    • Size

      43KB

    • MD5

      79385ed97732aee0036e67824de18e28

    • SHA1

      2f65a2b8ac21b3505855f7b89551cc1f31bf636e

    • SHA256

      8d684a790a5683b8decde9fb5a819c4a164d3032723a151a30ff26d3c2b1aabf

    • SHA512

      db1d99884ab384ed571195e7c85105fe1f5bef2cb7e81f1f9380a8aef99f71e9d51a46e5ea6d81acee72aa2c2eb1b371cd11097678cbd27cfa0ef9b254630072

    • Exorcist

      Ransomware-as-a-service which avoids infecting machines in CIS nations. First seen in mid-2020.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Deletes itself

    • Enumerates connected drives

    • Modifies service

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Defacement

1
T1491

Tasks