Resubmissions

13-01-2021 10:34

210113-326m92btsx 10

11-01-2021 23:36

210111-l5n9dyl6sx 8

General

  • Target

    781bc4dcbd459893397a8b987bf697f5b95435dfaf7fe3f4d2224728e7a2202a.bin

  • Size

    139KB

  • Sample

    210113-326m92btsx

  • MD5

    8555b213260ba5eda4bf37652cecb431

  • SHA1

    80bd92b996fce311b52aa791a8ace4b20f8fb7ab

  • SHA256

    781bc4dcbd459893397a8b987bf697f5b95435dfaf7fe3f4d2224728e7a2202a

  • SHA512

    0e4056303a68e4c3af5b639fdc0f434ab81452c4d06d92b97f4a8fa39383a7f963ac9dd09c4e89250678b9bc77b5f9bfd14efc294fd493ffa4c058215ba1b136

Malware Config

Targets

    • Target

      781bc4dcbd459893397a8b987bf697f5b95435dfaf7fe3f4d2224728e7a2202a.bin

    • Size

      139KB

    • MD5

      8555b213260ba5eda4bf37652cecb431

    • SHA1

      80bd92b996fce311b52aa791a8ace4b20f8fb7ab

    • SHA256

      781bc4dcbd459893397a8b987bf697f5b95435dfaf7fe3f4d2224728e7a2202a

    • SHA512

      0e4056303a68e4c3af5b639fdc0f434ab81452c4d06d92b97f4a8fa39383a7f963ac9dd09c4e89250678b9bc77b5f9bfd14efc294fd493ffa4c058215ba1b136

    • Ryuk

      Ransomware distributed via existing botnets, often Trickbot or Emotet.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Loads dropped DLL

    • Modifies file permissions

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

File Permissions Modification

1
T1222

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks