General

  • Target

    887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d.sample

  • Size

    1.1MB

  • Sample

    210726-7za2gl29gn

  • MD5

    6b20ef8fb494cc6e455220356de298d0

  • SHA1

    763d356d30e81d1cd15f6bc6a31f96181edb0b8f

  • SHA256

    887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d

  • SHA512

    ef53b73a911a608439bf929fa66a66fbf015ed274735b91c1d3b08128b14d6514d5514157e541441b9de0827d068c8f514cfd24a3a52fecb2d09764c4fb3311a

Malware Config

Targets

    • Target

      887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d.sample

    • Size

      1.1MB

    • MD5

      6b20ef8fb494cc6e455220356de298d0

    • SHA1

      763d356d30e81d1cd15f6bc6a31f96181edb0b8f

    • SHA256

      887aac61771af200f7e58bf0d02cb96d9befa11deda4e448f0a700ccb186ce9d

    • SHA512

      ef53b73a911a608439bf929fa66a66fbf015ed274735b91c1d3b08128b14d6514d5514157e541441b9de0827d068c8f514cfd24a3a52fecb2d09764c4fb3311a

    • WastedLocker

      Ransomware family seen in the wild since May 2020.

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Possible privilege escalation attempt

    • Deletes itself

    • Loads dropped DLL

    • Modifies file permissions

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

File Deletion

2
T1107

File Permissions Modification

1
T1222

Hidden Files and Directories

1
T1158

Impact

Inhibit System Recovery

2
T1490

Tasks