General

  • Target

    1069-cc87764d70827118862689d1630efc72547f97aa

  • Size

    3.2MB

  • Sample

    210727-9vcn6dpgga

  • MD5

    f17e50158a1faf71deb3a6e8b4f3271f

  • SHA1

    cc87764d70827118862689d1630efc72547f97aa

  • SHA256

    99a0753cba25425651e42ff7673506aa4090a03d8398f702e41d80ca5c2b212e

  • SHA512

    e60404ec7d526dd522ca6347c1fbc87f9783b0c0fa31ca4b8aaa656718a8ceaaf26ec8259a31df58ddb0500df8b7a0f63ad7aca652860d50baf4bc66fdd7643b

Malware Config

Targets

    • Target

      1069-cc87764d70827118862689d1630efc72547f97aa

    • Size

      3.2MB

    • MD5

      f17e50158a1faf71deb3a6e8b4f3271f

    • SHA1

      cc87764d70827118862689d1630efc72547f97aa

    • SHA256

      99a0753cba25425651e42ff7673506aa4090a03d8398f702e41d80ca5c2b212e

    • SHA512

      e60404ec7d526dd522ca6347c1fbc87f9783b0c0fa31ca4b8aaa656718a8ceaaf26ec8259a31df58ddb0500df8b7a0f63ad7aca652860d50baf4bc66fdd7643b

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Checks whether UAC is enabled

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

File Deletion

2
T1107

Discovery

System Information Discovery

2
T1082

Impact

Inhibit System Recovery

2
T1490

Defacement

1
T1491

Tasks