General

  • Target

    5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.sample

  • Size

    1.0MB

  • Sample

    210726-znrw6w8316

  • MD5

    572fea5f025df78f2d316216fbeee52e

  • SHA1

    91b2bf44b1f9282c09f07f16631deaa3ad9d956d

  • SHA256

    5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367

  • SHA512

    eb238272227c5825477ff1e37dc4f7e467665049d4db5649fff59c39d7745e88b06234d6d1218c05c802e33e21577f9d4a533cb9e23ebe6fb09654f97759c187

Malware Config

Targets

    • Target

      5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367.sample

    • Size

      1.0MB

    • MD5

      572fea5f025df78f2d316216fbeee52e

    • SHA1

      91b2bf44b1f9282c09f07f16631deaa3ad9d956d

    • SHA256

      5cd04805f9753ca08b82e88c27bf5426d1d356bb26b281885573051048911367

    • SHA512

      eb238272227c5825477ff1e37dc4f7e467665049d4db5649fff59c39d7745e88b06234d6d1218c05c802e33e21577f9d4a533cb9e23ebe6fb09654f97759c187

    • WastedLocker

      Ransomware family seen in the wild since May 2020.

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Possible privilege escalation attempt

    • Deletes itself

    • Loads dropped DLL

    • Modifies file permissions

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

File Deletion

2
T1107

File Permissions Modification

1
T1222

Hidden Files and Directories

1
T1158

Impact

Inhibit System Recovery

2
T1490

Tasks