General

  • Target

    2d2d2e39ccae1ff764e6618b5d7636d41ac6e752ce56d69a9acbb9cb1c8183d0.bin

  • Size

    46KB

  • Sample

    210512-clepswwdws

  • MD5

    75d07587e095647ff8f18479e73831b2

  • SHA1

    5da9c3f4b1db7972cf21d1553562660b289a4c59

  • SHA256

    2d2d2e39ccae1ff764e6618b5d7636d41ac6e752ce56d69a9acbb9cb1c8183d0

  • SHA512

    2e7dc10f3730824029359716b12d29d3b23b19f1d1e0bfd058d1ab05a6c469aae39a13d9c48e602cd262e4ed480d5697b4dc831a68a3f6713b333c643116ef65

Score
10/10

Malware Config

Targets

    • Target

      2d2d2e39ccae1ff764e6618b5d7636d41ac6e752ce56d69a9acbb9cb1c8183d0.bin

    • Size

      46KB

    • MD5

      75d07587e095647ff8f18479e73831b2

    • SHA1

      5da9c3f4b1db7972cf21d1553562660b289a4c59

    • SHA256

      2d2d2e39ccae1ff764e6618b5d7636d41ac6e752ce56d69a9acbb9cb1c8183d0

    • SHA512

      2e7dc10f3730824029359716b12d29d3b23b19f1d1e0bfd058d1ab05a6c469aae39a13d9c48e602cd262e4ed480d5697b4dc831a68a3f6713b333c643116ef65

    Score
    10/10
    • MountLocker Ransomware

      Ransomware family first seen in late 2020, which threatens to leak files if ransom is not paid.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Deletes itself

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v6

Tasks