Resubmissions

20-09-2020 09:53

200920-9rh6v6y6ga 10

20-09-2020 09:09

200920-94a3wvdaln 10

20-09-2020 07:26

200920-gyqrj2hcqj 10

20-09-2020 07:11

200920-xak2q5j4ha 10

General

  • Target

    ioxyfx.dat

  • Size

    7.1MB

  • Sample

    200920-9rh6v6y6ga

  • MD5

    d5f9fa1a8dca5319432f51a5891f7794

  • SHA1

    2a937328f5b99eccb9b8c13ed71d6ffb9dff4521

  • SHA256

    18f4123ee42f5a29f8df7bd1cf95ab73441f082584f390aa218c2dd1134f4055

  • SHA512

    87013b63a9b153c5268784928394dfbf1eeff1b91eea6bdf187025e63d25c535e468e59a33f47d23682a386605bb314311e50a7edd1d6deb1b60f5008237a7d0

Malware Config

Targets

    • Target

      ioxyfx.dat

    • Size

      7.1MB

    • MD5

      d5f9fa1a8dca5319432f51a5891f7794

    • SHA1

      2a937328f5b99eccb9b8c13ed71d6ffb9dff4521

    • SHA256

      18f4123ee42f5a29f8df7bd1cf95ab73441f082584f390aa218c2dd1134f4055

    • SHA512

      87013b63a9b153c5268784928394dfbf1eeff1b91eea6bdf187025e63d25c535e468e59a33f47d23682a386605bb314311e50a7edd1d6deb1b60f5008237a7d0

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • Zhen Ransomware

      First seen in September 2020. Drops ransomnote as .ini file.

    • Executes dropped EXE

    • Modifies WinLogon to allow AutoLogon

      Enables rebooting of the machine without requiring login credentials.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Possible privilege escalation attempt

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Modifies service

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks