General

  • Target

    admin.exe

  • Size

    63KB

  • Sample

    210417-jn2rzne8lx

  • MD5

    ae776cbf46e5d71831c0d0d6c37b3bbf

  • SHA1

    3ee387589ef93afe4ed2609c0c242e29f5d164b4

  • SHA256

    83e2ba9faf075547be65d2b6dbd13e190a0b1c1cf626788cb756ab7a3c770dcb

  • SHA512

    486d0ce8e49b1ab0fd6a56d6982abad8661c35fb27343a623c7a58bf1f5a74ccff3a954d02e9713d501bb72e9dac829f459cad2f1b3cc225ce052568ee3785ee

Score
9/10

Malware Config

Targets

    • Target

      admin.exe

    • Size

      63KB

    • MD5

      ae776cbf46e5d71831c0d0d6c37b3bbf

    • SHA1

      3ee387589ef93afe4ed2609c0c242e29f5d164b4

    • SHA256

      83e2ba9faf075547be65d2b6dbd13e190a0b1c1cf626788cb756ab7a3c770dcb

    • SHA512

      486d0ce8e49b1ab0fd6a56d6982abad8661c35fb27343a623c7a58bf1f5a74ccff3a954d02e9713d501bb72e9dac829f459cad2f1b3cc225ce052568ee3785ee

    Score
    9/10
    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Deletes itself

    • Drops startup file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Impact

Inhibit System Recovery

2
T1490

Tasks