General

  • Target

    5a63e7d371dd69c5625f5b48da426c14.exe

  • Size

    43KB

  • Sample

    200724-gmz55kbvr2

  • MD5

    5a63e7d371dd69c5625f5b48da426c14

  • SHA1

    63a5bd8b7ed922ad5fe498d2a15a57d1d552055a

  • SHA256

    b1bcc54ef15f91d9291357eca02862174bd6158e95813eff1ab0c16ba48ff10e

  • SHA512

    a228061433052e64965ee9cdd678bbe2fa18c88b214642176437504b107c97f68912b1760f15b1e56a7bc9d5ac14ddd1bb2dcfdf27958e88e1a5f0db6cfbc767

Malware Config

Targets

    • Target

      5a63e7d371dd69c5625f5b48da426c14.exe

    • Size

      43KB

    • MD5

      5a63e7d371dd69c5625f5b48da426c14

    • SHA1

      63a5bd8b7ed922ad5fe498d2a15a57d1d552055a

    • SHA256

      b1bcc54ef15f91d9291357eca02862174bd6158e95813eff1ab0c16ba48ff10e

    • SHA512

      a228061433052e64965ee9cdd678bbe2fa18c88b214642176437504b107c97f68912b1760f15b1e56a7bc9d5ac14ddd1bb2dcfdf27958e88e1a5f0db6cfbc767

    • Exorcist

      Ransomware-as-a-service which avoids infecting machines in CIS nations. First seen in mid-2020.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Enumerates connected drives

    • Modifies service

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks