General

  • Target

    Setup.exe.lnk

  • Size

    1KB

  • Sample

    210122-72b93f6nv6

  • MD5

    ce0a1a679127310043bbe215c0296fb7

  • SHA1

    a8df0b8eec8ada6fb9c929e856783bcad76853a9

  • SHA256

    dab776240d6cc6c074552e75ffb5e849e51caf821707ea3e30cef2b115fd4024

  • SHA512

    26ae4366d2c3e8da76834a72150b33592a93bb85761fdb1e7c562931333cf8b27b7256e0ab98006b1325b7993851863b145aedeba650bd7a845c32e2c7f5230f

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

https://bit.ly/2MicNjm

Targets

    • Target

      Setup.exe.lnk

    • Size

      1KB

    • MD5

      ce0a1a679127310043bbe215c0296fb7

    • SHA1

      a8df0b8eec8ada6fb9c929e856783bcad76853a9

    • SHA256

      dab776240d6cc6c074552e75ffb5e849e51caf821707ea3e30cef2b115fd4024

    • SHA512

      26ae4366d2c3e8da76834a72150b33592a93bb85761fdb1e7c562931333cf8b27b7256e0ab98006b1325b7993851863b145aedeba650bd7a845c32e2c7f5230f

    Score
    10/10
    • Blocklisted process makes network request

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

BITS Jobs

1
T1197

Defense Evasion

BITS Jobs

1
T1197

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

1
T1082

Tasks