General

  • Target

    4e9762d0385abc614f124624ea9be798a831e4075266918dfe1408b695a85731

  • Size

    2.0MB

  • Sample

    210409-f3kn7s5352

  • MD5

    969b2014bcf47f5c53b5387873d05b23

  • SHA1

    75aa2bc6cf06b8b75797d0934fa6f6ab93ecac2e

  • SHA256

    4e9762d0385abc614f124624ea9be798a831e4075266918dfe1408b695a85731

  • SHA512

    ae630548dd74c15cd7fe7917bfeeeb6baad61a385e94db61cbdcb2a8db8b7b4544a9ea9b7c937da25dc9e60711c6222cbef1ad910c0c1782cf2436471df07e08

Score
9/10

Malware Config

Targets

    • Target

      4e9762d0385abc614f124624ea9be798a831e4075266918dfe1408b695a85731

    • Size

      2.0MB

    • MD5

      969b2014bcf47f5c53b5387873d05b23

    • SHA1

      75aa2bc6cf06b8b75797d0934fa6f6ab93ecac2e

    • SHA256

      4e9762d0385abc614f124624ea9be798a831e4075266918dfe1408b695a85731

    • SHA512

      ae630548dd74c15cd7fe7917bfeeeb6baad61a385e94db61cbdcb2a8db8b7b4544a9ea9b7c937da25dc9e60711c6222cbef1ad910c0c1782cf2436471df07e08

    Score
    9/10
    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Modifies file permissions

    • Drops desktop.ini file(s)

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

File Permissions Modification

1
T1222

Impact

Inhibit System Recovery

2
T1490

Tasks