General

  • Target

    9b9afe28f57f6be5a6c9cf168d8576c89bbb2fb12d81a00ffc7f6b5d2d436a42

  • Size

    1.6MB

  • Sample

    210409-qc9bsqr4qe

  • MD5

    e781ae58fec6d2b20435cadc54ebacc6

  • SHA1

    10e0ea742be37cd6a53409ce936332303bd589e8

  • SHA256

    9b9afe28f57f6be5a6c9cf168d8576c89bbb2fb12d81a00ffc7f6b5d2d436a42

  • SHA512

    46de27a118ad3c77e56d184beb2ccccc8f49f5b13afbaf8775fe62b4272f1729bd42d60b79609615d397f4d4c211e4ff9afe7f4b1075f420ffa3ecf8823feb77

Score
9/10

Malware Config

Targets

    • Target

      9b9afe28f57f6be5a6c9cf168d8576c89bbb2fb12d81a00ffc7f6b5d2d436a42

    • Size

      1.6MB

    • MD5

      e781ae58fec6d2b20435cadc54ebacc6

    • SHA1

      10e0ea742be37cd6a53409ce936332303bd589e8

    • SHA256

      9b9afe28f57f6be5a6c9cf168d8576c89bbb2fb12d81a00ffc7f6b5d2d436a42

    • SHA512

      46de27a118ad3c77e56d184beb2ccccc8f49f5b13afbaf8775fe62b4272f1729bd42d60b79609615d397f4d4c211e4ff9afe7f4b1075f420ffa3ecf8823feb77

    Score
    9/10
    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Impact

Inhibit System Recovery

2
T1490

Defacement

1
T1491

Tasks