General

  • Target

    wastlock_15.exe

  • Size

    1.1MB

  • Sample

    200831-5g6hq8r68a

  • MD5

    f67ea8e471e827e4b7b65b65647d1d46

  • SHA1

    e62d3a4fe0da1b1b8e9bcff3148becd6d02bcb07

  • SHA256

    e3bf41de3a7edf556d43b6196652aa036e48a602bb3f7c98af9dae992222a8eb

  • SHA512

    b6b2cc29a5c5247d4a68ec7e7d0080e2f6e460eee98ece85498fe25b044beea8d3e15139bcdbaad744c6fb3e9caff7a127bd4487ba35c191a57883e2b47aecc4

Malware Config

Targets

    • Target

      wastlock_15.exe

    • Size

      1.1MB

    • MD5

      f67ea8e471e827e4b7b65b65647d1d46

    • SHA1

      e62d3a4fe0da1b1b8e9bcff3148becd6d02bcb07

    • SHA256

      e3bf41de3a7edf556d43b6196652aa036e48a602bb3f7c98af9dae992222a8eb

    • SHA512

      b6b2cc29a5c5247d4a68ec7e7d0080e2f6e460eee98ece85498fe25b044beea8d3e15139bcdbaad744c6fb3e9caff7a127bd4487ba35c191a57883e2b47aecc4

    • WastedLocker

      Ransomware family seen in the wild since May 2020.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Possible privilege escalation attempt

    • Deletes itself

    • Loads dropped DLL

    • Modifies file permissions

    • Drops file in System32 directory

    • Modifies service

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Hidden Files and Directories

1
T1158

Defense Evasion

File Deletion

2
T1107

File Permissions Modification

1
T1222

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Impact

Inhibit System Recovery

2
T1490

Tasks