General

  • Target

    a344ab4143b6c5421294ddcf8ec51e9bdcf8dbde7c977802e30fcffd4af421c9

  • Size

    1.2MB

  • Sample

    201008-ms9g4jnjpn

  • MD5

    6fe408f8b05946b1bb862fc20b6affff

  • SHA1

    038e85d70ade727259bd2ad5f70d4d7890c88924

  • SHA256

    a344ab4143b6c5421294ddcf8ec51e9bdcf8dbde7c977802e30fcffd4af421c9

  • SHA512

    b41eae36b7db0d2aac948c463ad443de7e3bf6762965923d4f9c65b8ff5eab86bff29fa35a7fb25247be5ca77e8abb1d4f391308f3f63617a52a2bb6b226b0b8

Malware Config

Targets

    • Target

      a344ab4143b6c5421294ddcf8ec51e9bdcf8dbde7c977802e30fcffd4af421c9

    • Size

      1.2MB

    • MD5

      6fe408f8b05946b1bb862fc20b6affff

    • SHA1

      038e85d70ade727259bd2ad5f70d4d7890c88924

    • SHA256

      a344ab4143b6c5421294ddcf8ec51e9bdcf8dbde7c977802e30fcffd4af421c9

    • SHA512

      b41eae36b7db0d2aac948c463ad443de7e3bf6762965923d4f9c65b8ff5eab86bff29fa35a7fb25247be5ca77e8abb1d4f391308f3f63617a52a2bb6b226b0b8

    • Matrix Ransomware

      Targeted ransomware with information collection and encryption functionality.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Sets service image path in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies service

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks