General

  • Target

    1.exe

  • Size

    808KB

  • Sample

    210716-3jrnj8392j

  • MD5

    8240d60d83cb7c0248e64389855e29b4

  • SHA1

    3b40dbdc418d2d5de5f552a054a32bfbac18c5cc

  • SHA256

    fdbc66ebe7af710e15946e1541e2e81ddfd62aa3b35339288a9a244fb56a74cf

  • SHA512

    c7b9bd58c12a9b0d0b3d7b0984d2ac7295bf5417477df96a6c788a19f3e623f1e4cd7ffd5f94e2ca56795d1d01fb0e754b5ea99c556e724b7ecfbbc774ba3cee

Malware Config

Targets

    • Target

      1.exe

    • Size

      808KB

    • MD5

      8240d60d83cb7c0248e64389855e29b4

    • SHA1

      3b40dbdc418d2d5de5f552a054a32bfbac18c5cc

    • SHA256

      fdbc66ebe7af710e15946e1541e2e81ddfd62aa3b35339288a9a244fb56a74cf

    • SHA512

      c7b9bd58c12a9b0d0b3d7b0984d2ac7295bf5417477df96a6c788a19f3e623f1e4cd7ffd5f94e2ca56795d1d01fb0e754b5ea99c556e724b7ecfbbc774ba3cee

    • Hive

      A ransomware written in Golang first seen in June 2021.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Drops file in Drivers directory

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks