General

  • Target

    b9a33e0225555e2d41582f81a7fa73fe431817f6e169d55540b250907dec7aaf

  • Size

    846KB

  • Sample

    210409-m9xc9xq1lx

  • MD5

    d63de35d8cf9b12c28d3d5509dd16aae

  • SHA1

    d33baa05a06e364d1dd31a611b97f5d935d11e6b

  • SHA256

    b9a33e0225555e2d41582f81a7fa73fe431817f6e169d55540b250907dec7aaf

  • SHA512

    aa5a41b7026a354880a914938ca84cfb489ba01689b4954e0e501f480e7bbf18ae951ca33d05ab51ad662d23a80b70ab00187f5127867a89b15627e0f21a6d50

Malware Config

Targets

    • Target

      b9a33e0225555e2d41582f81a7fa73fe431817f6e169d55540b250907dec7aaf

    • Size

      846KB

    • MD5

      d63de35d8cf9b12c28d3d5509dd16aae

    • SHA1

      d33baa05a06e364d1dd31a611b97f5d935d11e6b

    • SHA256

      b9a33e0225555e2d41582f81a7fa73fe431817f6e169d55540b250907dec7aaf

    • SHA512

      aa5a41b7026a354880a914938ca84cfb489ba01689b4954e0e501f480e7bbf18ae951ca33d05ab51ad662d23a80b70ab00187f5127867a89b15627e0f21a6d50

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

File Permissions Modification

1
T1222

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

2
T1490

Tasks