Resubmissions

02-11-2020 09:26

201102-arw84b2l7a 10

01-11-2020 18:55

201101-6vvhqyxv6n 8

General

  • Target

    d5d744e0f7984ec01593da35f26bf24e95e4b1cc8bd1c0ff4f31de5dbf94e38f.bin.sample

  • Size

    133KB

  • Sample

    201102-arw84b2l7a

  • MD5

    ba59b52b445f45aaf8fb707445587b48

  • SHA1

    4d8a885624f580a3578026acae4f0bd53032db5d

  • SHA256

    d5d744e0f7984ec01593da35f26bf24e95e4b1cc8bd1c0ff4f31de5dbf94e38f

  • SHA512

    be951dca8946e187aacc86ef16fa319e6524191286316e3f387d21b1797f92dea6aa0f37ae47efd60f5fb7ccb342135049bb3753bbb35941438f6a690bae3137

Malware Config

Targets

    • Target

      d5d744e0f7984ec01593da35f26bf24e95e4b1cc8bd1c0ff4f31de5dbf94e38f.bin.sample

    • Size

      133KB

    • MD5

      ba59b52b445f45aaf8fb707445587b48

    • SHA1

      4d8a885624f580a3578026acae4f0bd53032db5d

    • SHA256

      d5d744e0f7984ec01593da35f26bf24e95e4b1cc8bd1c0ff4f31de5dbf94e38f

    • SHA512

      be951dca8946e187aacc86ef16fa319e6524191286316e3f387d21b1797f92dea6aa0f37ae47efd60f5fb7ccb342135049bb3753bbb35941438f6a690bae3137

    • Ryuk

      Ransomware distributed via existing botnets, often Trickbot or Emotet.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Permissions Modification

1
T1222

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks