General

  • Target

    f92a631f2f12e7ba8c9d031a31b5f4c1158e140665c5d081db55f67b11fb4a14

  • Size

    2.4MB

  • Sample

    201008-4galjyamzs

  • MD5

    c13d671ed16399a2b430c79b3200b425

  • SHA1

    9acfb64b5617566d97a9ded3b295915035b3e3e7

  • SHA256

    f92a631f2f12e7ba8c9d031a31b5f4c1158e140665c5d081db55f67b11fb4a14

  • SHA512

    1e4a9d96b8c0c3f967ccf52f7a3360e5a28929420475e565318c82e38fb75ed3039605f95d6e466e0d4f06100c4145800ca6bea2548d3d1ad89cc0d1093beef6

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://myexternalip.com/raw

Targets

    • Target

      f92a631f2f12e7ba8c9d031a31b5f4c1158e140665c5d081db55f67b11fb4a14

    • Size

      2.4MB

    • MD5

      c13d671ed16399a2b430c79b3200b425

    • SHA1

      9acfb64b5617566d97a9ded3b295915035b3e3e7

    • SHA256

      f92a631f2f12e7ba8c9d031a31b5f4c1158e140665c5d081db55f67b11fb4a14

    • SHA512

      1e4a9d96b8c0c3f967ccf52f7a3360e5a28929420475e565318c82e38fb75ed3039605f95d6e466e0d4f06100c4145800ca6bea2548d3d1ad89cc0d1093beef6

    • Matrix Ransomware

      Targeted ransomware with information collection and encryption functionality.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Blacklisted process makes network request

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Sets service image path in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies service

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks