General

  • Target

    31630d16f4564c7a214a206a58f60b7623cd1b3abb823d10ed50aa077ca33585.zip

  • Size

    27KB

  • Sample

    210513-cwse3qqtm6

  • MD5

    028daeca48b36dc40761c7364f6bc14f

  • SHA1

    562aeae1a082b6bc44c1ab9120050072defb90d0

  • SHA256

    03001d8c078671ee3d1b564721dafa2a3a323a079be9de59063ba5821cb45377

  • SHA512

    bb06128992bc3ce204f41e844e109dfdd610d85a053a2fc843749a692fdfd58fa8d76ff3dfe541b47361b9f13fb40162e280431bdbac0d2b92c8c107370762e2

Score
10/10

Malware Config

Targets

    • Target

      31630d16f4564c7a214a206a58f60b7623cd1b3abb823d10ed50aa077ca33585.dll

    • Size

      77KB

    • MD5

      0aacf2c41ba9b872a52055ffcaeaef15

    • SHA1

      c09b509699aeef71f3e205d53c5f4ff71cb48570

    • SHA256

      31630d16f4564c7a214a206a58f60b7623cd1b3abb823d10ed50aa077ca33585

    • SHA512

      d259de51d22d72d27d5947530317661b97ba8fcc36e7a2ad4835e98bc311ef1aa5964f939660733171934f6aefa82d8b76a6f9f04137e1aeca63d592f0fb26ec

    Score
    10/10
    • MountLocker Ransomware

      Ransomware family first seen in late 2020, which threatens to leak files if ransom is not paid.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Deletes itself

MITRE ATT&CK Enterprise v6

Tasks