General

  • Target

    ransom.exe

  • Size

    1.3MB

  • Sample

    210705-r59721xcmx

  • MD5

    cafcd59a669cfb2c981fcb8b58d0d1aa

  • SHA1

    e306781f95a37b5305a462b6f67611af2b776541

  • SHA256

    49921fa466e1dc65ea6c037726015a69c634fc1631a2e379bfb3d7cf7644bcad

  • SHA512

    a5b67b248e2d314599d53e7134fe8cb32c782517c95c98572c979242bfcdb0aa5fb862bcee34de31cc39ced596ff107f4a5a9b1161a08755431f708c9e9a5a08

Malware Config

Targets

    • Target

      ransom.exe

    • Size

      1.3MB

    • MD5

      cafcd59a669cfb2c981fcb8b58d0d1aa

    • SHA1

      e306781f95a37b5305a462b6f67611af2b776541

    • SHA256

      49921fa466e1dc65ea6c037726015a69c634fc1631a2e379bfb3d7cf7644bcad

    • SHA512

      a5b67b248e2d314599d53e7134fe8cb32c782517c95c98572c979242bfcdb0aa5fb862bcee34de31cc39ced596ff107f4a5a9b1161a08755431f708c9e9a5a08

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Modify Existing Service

1
T1031

Credential Access

Credentials in Files

1
T1081

Lateral Movement

Replication Through Removable Media

1
T1091

Collection

Data from Local System

1
T1005

Tasks