General

  • Target

    0e061255b12ade5dc10f4ad9aeca9ebe5496d28ed251acb376c66c1d9f405821.sample

  • Size

    112KB

  • Sample

    210726-xsbzf1661n

  • MD5

    d01fc079881dc0d33a88e4f8df1ae7ce

  • SHA1

    c40c8848808da12ef78c68de1e6477b862161a43

  • SHA256

    0e061255b12ade5dc10f4ad9aeca9ebe5496d28ed251acb376c66c1d9f405821

  • SHA512

    83bca79d1f0ac14c6d79685fd192964e7117e8c9c734036abddfdbb068c801ff38027a0812a2499e1d9e528a47af07150cafee27384b5a78b8fc32c23bd21130

Malware Config

Targets

    • Target

      0e061255b12ade5dc10f4ad9aeca9ebe5496d28ed251acb376c66c1d9f405821.sample

    • Size

      112KB

    • MD5

      d01fc079881dc0d33a88e4f8df1ae7ce

    • SHA1

      c40c8848808da12ef78c68de1e6477b862161a43

    • SHA256

      0e061255b12ade5dc10f4ad9aeca9ebe5496d28ed251acb376c66c1d9f405821

    • SHA512

      83bca79d1f0ac14c6d79685fd192964e7117e8c9c734036abddfdbb068c801ff38027a0812a2499e1d9e528a47af07150cafee27384b5a78b8fc32c23bd21130

    • WastedLocker

      Ransomware family seen in the wild since May 2020.

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Possible privilege escalation attempt

    • Deletes itself

    • Loads dropped DLL

    • Modifies file permissions

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

File Deletion

2
T1107

File Permissions Modification

1
T1222

Hidden Files and Directories

1
T1158

Impact

Inhibit System Recovery

2
T1490

Tasks