General

  • Target

    Cyanide.exe

  • Size

    150KB

  • Sample

    210213-qy1msbm93n

  • MD5

    88552621245e13e37456450b670b040e

  • SHA1

    e2f8374fae2dc206dc390c73c866567691385af9

  • SHA256

    7dfdcd5bc610f3718de9ecd3fc67aba996d3a9c786b5954832ede3cc99d0b0b7

  • SHA512

    f592750acfe72794a523876cac0c651c9e25414e650203b0001364d3591ca0ed4344c54c961c19233d08b63515672fa6f378d86882457987f2d8cbe6948a3b61

Malware Config

Targets

    • Target

      Cyanide.exe

    • Size

      150KB

    • MD5

      88552621245e13e37456450b670b040e

    • SHA1

      e2f8374fae2dc206dc390c73c866567691385af9

    • SHA256

      7dfdcd5bc610f3718de9ecd3fc67aba996d3a9c786b5954832ede3cc99d0b0b7

    • SHA512

      f592750acfe72794a523876cac0c651c9e25414e650203b0001364d3591ca0ed4344c54c961c19233d08b63515672fa6f378d86882457987f2d8cbe6948a3b61

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Executes dropped EXE

    • Possible privilege escalation attempt

    • Modifies file permissions

    • Modifies boot configuration data using bcdedit

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Bootkit

1
T1067

Defense Evasion

File Deletion

3
T1107

File Permissions Modification

1
T1222

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Impact

Inhibit System Recovery

3
T1490

Tasks