General

  • Target

    028f0b1092caf4711857d0958bc798882c4ac9285895c3628f5be0c988f1d560.exe

  • Size

    256KB

  • Sample

    210814-2dgb3tvqgx

  • MD5

    156ed66fb7257ef1bdd6385c71e5aa83

  • SHA1

    2d302323eab61e5791ab5ce2c6728e6708743bed

  • SHA256

    028f0b1092caf4711857d0958bc798882c4ac9285895c3628f5be0c988f1d560

  • SHA512

    c63a679abf8eb64ba4a722df4638249499d8ab9e6a94db5e3d39ab136afbe4cec563ff9698814170b12e55d5616865776273303e99a5b7e8742bc870ae5ebdb4

Malware Config

Targets

    • Target

      028f0b1092caf4711857d0958bc798882c4ac9285895c3628f5be0c988f1d560.exe

    • Size

      256KB

    • MD5

      156ed66fb7257ef1bdd6385c71e5aa83

    • SHA1

      2d302323eab61e5791ab5ce2c6728e6708743bed

    • SHA256

      028f0b1092caf4711857d0958bc798882c4ac9285895c3628f5be0c988f1d560

    • SHA512

      c63a679abf8eb64ba4a722df4638249499d8ab9e6a94db5e3d39ab136afbe4cec563ff9698814170b12e55d5616865776273303e99a5b7e8742bc870ae5ebdb4

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks