General

  • Target

    c80ad6ada1635b8bca10287561eeae15.exe

  • Size

    693KB

  • Sample

    210926-r8qtcsehej

  • MD5

    c80ad6ada1635b8bca10287561eeae15

  • SHA1

    adcdbf7bffc69fb590785637a9a78a195421a375

  • SHA256

    e9a78c00f0c651f605119a584225f7ac87ef48eff719b6b4414931c88e7df7df

  • SHA512

    b08ae40cedcace5a918553923dc5a87ea488364c948fe5f3562d2a6353eac0a31779ecd18ef30770b3a5a2098ea7ec8886dc09b73026e407ebc52c39222025ba

Malware Config

Targets

    • Target

      c80ad6ada1635b8bca10287561eeae15.exe

    • Size

      693KB

    • MD5

      c80ad6ada1635b8bca10287561eeae15

    • SHA1

      adcdbf7bffc69fb590785637a9a78a195421a375

    • SHA256

      e9a78c00f0c651f605119a584225f7ac87ef48eff719b6b4414931c88e7df7df

    • SHA512

      b08ae40cedcace5a918553923dc5a87ea488364c948fe5f3562d2a6353eac0a31779ecd18ef30770b3a5a2098ea7ec8886dc09b73026e407ebc52c39222025ba

    • Detected Djvu ransomware

    • Djvu Ransomware

      Ransomware which is a variant of the STOP family.

    • suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request

      suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request

    • Modifies file permissions

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Permissions Modification

1
T1222

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

1
T1082

Tasks