General

  • Target

    客户端.exe

  • Size

    128KB

  • Sample

    210211-fxdvpmqv4e

  • MD5

    f40488f37218658bbc8f8897ae240d32

  • SHA1

    69324969b0ec1c8b467037514005e9368a997765

  • SHA256

    cc3cc6a1905bcacf25dd804f51b1856cea7f69f751d8981a1fe34d1b77a8a494

  • SHA512

    269d08d7cabca91220f0a76c8def4f7848443ae3c26e094a0a93a5fc4fd95fb39a296172b918735a1e35d470b6c10da5459c5f7f892497162a53c363ef090a81

Malware Config

Targets

    • Target

      客户端.exe

    • Size

      128KB

    • MD5

      f40488f37218658bbc8f8897ae240d32

    • SHA1

      69324969b0ec1c8b467037514005e9368a997765

    • SHA256

      cc3cc6a1905bcacf25dd804f51b1856cea7f69f751d8981a1fe34d1b77a8a494

    • SHA512

      269d08d7cabca91220f0a76c8def4f7848443ae3c26e094a0a93a5fc4fd95fb39a296172b918735a1e35d470b6c10da5459c5f7f892497162a53c363ef090a81

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks