Resubmissions

19-11-2020 11:31

201119-qt7r33qcre 8

19-11-2020 08:31

201119-pvsltmgsys 8

General

  • Target

    4963869334470656.zip

  • Size

    72KB

  • Sample

    201119-pvsltmgsys

  • MD5

    f3e4f8cfb0dea92bd9415bb670ff7934

  • SHA1

    f8a2e2562d88f08779562cfef2a74e3118689779

  • SHA256

    47a6b20d09153ebddf527274742655bbf7ba1b9a2b2c3ed0fd38e840cbe951f1

  • SHA512

    f66233d84ab6f8ee41ff90c97bed8a889f38977dc66a7b6428b505b6b315a9dbceff91735d28e595906e81c2284f57645ad5c01d4a9dee8fdc2bdbb2058d328c

Score
8/10

Malware Config

Targets

    • Target

      f94fbc387e32abb67244f5130becb5f50d8094726eaf592fd71ba94c4efd17b1

    • Size

      130KB

    • MD5

      c6d312f61bfa434c22e7c1eccb334b90

    • SHA1

      6741b06dfbcf8fcbf2d409af021ca8f94eeb7124

    • SHA256

      f94fbc387e32abb67244f5130becb5f50d8094726eaf592fd71ba94c4efd17b1

    • SHA512

      23ccd656c1d36cb3d3c15068d63c8608f2508b2212562dd60624fe7bf292c0dea3a8f54bad70efd2df8f4d6eb3d33ff222fab4826bebb59231ec7b6a055fa07c

    Score
    8/10
    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks