General

  • Target

    60d53d840285d033deb6ccf011665b612721a5d99a2d132d3a8adcf99fbf0fc1

  • Size

    375KB

  • Sample

    200917-gq9jhe7j16

  • MD5

    d5882c247d498f62deced08d118e122f

  • SHA1

    d889058027e41165b300e2b1864e45b33d0ec142

  • SHA256

    60d53d840285d033deb6ccf011665b612721a5d99a2d132d3a8adcf99fbf0fc1

  • SHA512

    5c714e72e14dac9c4da2cd29cc4d73d8e62537b1bb92bae3f3ed8b8109bf80d6647e0f1c634198af96a239c2511a7bbb37d63e7dbd0b3241a1f3869b3b32b4f2

Malware Config

Targets

    • Target

      60d53d840285d033deb6ccf011665b612721a5d99a2d132d3a8adcf99fbf0fc1

    • Size

      375KB

    • MD5

      d5882c247d498f62deced08d118e122f

    • SHA1

      d889058027e41165b300e2b1864e45b33d0ec142

    • SHA256

      60d53d840285d033deb6ccf011665b612721a5d99a2d132d3a8adcf99fbf0fc1

    • SHA512

      5c714e72e14dac9c4da2cd29cc4d73d8e62537b1bb92bae3f3ed8b8109bf80d6647e0f1c634198af96a239c2511a7bbb37d63e7dbd0b3241a1f3869b3b32b4f2

    • Ouroboros/Zeropadypt

      Ransomware family based on open-source CryptoWire.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Modifies Windows Firewall

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks