General

  • Target

    557314de998d75904fc52be9b37ff297264e8534f74f4d65e0cb862cc68bba49

  • Size

    1.6MB

  • Sample

    210409-4lv1r9f4xs

  • MD5

    c83b39d1102fb6f7b565b8c68c317c69

  • SHA1

    fcd535d853318ebc70e7bda72825706e7907ab1e

  • SHA256

    557314de998d75904fc52be9b37ff297264e8534f74f4d65e0cb862cc68bba49

  • SHA512

    e7b3621afb6f5d88aa53238606a414e28f1073b56d14843458f2a7d58eece460ff10c00e5b56d591a8b21c5cbdbc8c36ddb6ff00725bee6bf94950958272140f

Score
9/10

Malware Config

Targets

    • Target

      557314de998d75904fc52be9b37ff297264e8534f74f4d65e0cb862cc68bba49

    • Size

      1.6MB

    • MD5

      c83b39d1102fb6f7b565b8c68c317c69

    • SHA1

      fcd535d853318ebc70e7bda72825706e7907ab1e

    • SHA256

      557314de998d75904fc52be9b37ff297264e8534f74f4d65e0cb862cc68bba49

    • SHA512

      e7b3621afb6f5d88aa53238606a414e28f1073b56d14843458f2a7d58eece460ff10c00e5b56d591a8b21c5cbdbc8c36ddb6ff00725bee6bf94950958272140f

    Score
    9/10
    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Impact

Inhibit System Recovery

2
T1490

Defacement

1
T1491

Tasks