General

  • Target

    9d044def0f2ecf958fc8fad895547a924058a34f795bff9a3d5f33ddc1e4c65d

  • Size

    1.1MB

  • Sample

    210515-mq4zzjg8vj

  • MD5

    0a44ea401960942fb659e2516a47a230

  • SHA1

    af730afece5517a2e8e27d873d2241814381feb2

  • SHA256

    9d044def0f2ecf958fc8fad895547a924058a34f795bff9a3d5f33ddc1e4c65d

  • SHA512

    73a110d75540dd3b33d344e3bcf7633d19bc74f703d709de93a6389fd22ee8429267c175c1adafd9816924b421ed9b3dc1a33d4d4f93887b179f33eec5bea31a

Malware Config

Targets

    • Target

      9d044def0f2ecf958fc8fad895547a924058a34f795bff9a3d5f33ddc1e4c65d

    • Size

      1.1MB

    • MD5

      0a44ea401960942fb659e2516a47a230

    • SHA1

      af730afece5517a2e8e27d873d2241814381feb2

    • SHA256

      9d044def0f2ecf958fc8fad895547a924058a34f795bff9a3d5f33ddc1e4c65d

    • SHA512

      73a110d75540dd3b33d344e3bcf7633d19bc74f703d709de93a6389fd22ee8429267c175c1adafd9816924b421ed9b3dc1a33d4d4f93887b179f33eec5bea31a

    • Adds autorun key to be loaded by Explorer.exe on startup

    • BadRabbit

      Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks