General

  • Target

    Cryptor.exe

  • Size

    378KB

  • Sample

    200919-rdvem27n6a

  • MD5

    b2b30ddd95457713b66821f6af801a9b

  • SHA1

    703a66ef27b30a2b1e4b475a2210ee1b32cdc31e

  • SHA256

    585c06f31303246e92ca3193aace87126f7de41d3de22c651558c875cdfcb046

  • SHA512

    efea4c357aa4a234c9a6aba6e2ae89d10cf4a085263595e105b769a7fed95725d252673858750483c3164b2ee18de9c6d7356c445f9592788f1760c70d28a3d7

Malware Config

Targets

    • Target

      Cryptor.exe

    • Size

      378KB

    • MD5

      b2b30ddd95457713b66821f6af801a9b

    • SHA1

      703a66ef27b30a2b1e4b475a2210ee1b32cdc31e

    • SHA256

      585c06f31303246e92ca3193aace87126f7de41d3de22c651558c875cdfcb046

    • SHA512

      efea4c357aa4a234c9a6aba6e2ae89d10cf4a085263595e105b769a7fed95725d252673858750483c3164b2ee18de9c6d7356c445f9592788f1760c70d28a3d7

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds Run key to start application

    • Modifies service

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Modify Existing Service

1
T1031

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Impact

Inhibit System Recovery

2
T1490

Tasks