General

  • Target

    f92a631f2f12e7ba8c9d031a31b5f4c1158e140665c5d081db55f67b11fb4a14

  • Size

    2.4MB

  • Sample

    201008-4galjyamzs

  • MD5

    c13d671ed16399a2b430c79b3200b425

  • SHA1

    9acfb64b5617566d97a9ded3b295915035b3e3e7

  • SHA256

    f92a631f2f12e7ba8c9d031a31b5f4c1158e140665c5d081db55f67b11fb4a14

  • SHA512

    1e4a9d96b8c0c3f967ccf52f7a3360e5a28929420475e565318c82e38fb75ed3039605f95d6e466e0d4f06100c4145800ca6bea2548d3d1ad89cc0d1093beef6

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://myexternalip.com/raw

Targets

    • Target

      f92a631f2f12e7ba8c9d031a31b5f4c1158e140665c5d081db55f67b11fb4a14

    • Size

      2.4MB

    • MD5

      c13d671ed16399a2b430c79b3200b425

    • SHA1

      9acfb64b5617566d97a9ded3b295915035b3e3e7

    • SHA256

      f92a631f2f12e7ba8c9d031a31b5f4c1158e140665c5d081db55f67b11fb4a14

    • SHA512

      1e4a9d96b8c0c3f967ccf52f7a3360e5a28929420475e565318c82e38fb75ed3039605f95d6e466e0d4f06100c4145800ca6bea2548d3d1ad89cc0d1093beef6

    • Matrix Ransomware

      Targeted ransomware with information collection and encryption functionality.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Blacklisted process makes network request

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Sets service image path in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies service

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Modify Existing Service

1
T1031

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

File Deletion

2
T1107

Modify Registry

3
T1112

File Permissions Modification

1
T1222

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

3
T1490

Defacement

1
T1491

Tasks