General

  • Target

    IHAransom.exe

  • Size

    231KB

  • Sample

    211028-kdnl7aacd3

  • MD5

    5f775c9a9d49013ef37aa7d332327af4

  • SHA1

    f96eeeaebef8e4d1ed74f7c557ef2a9d3c021bc8

  • SHA256

    6fafb9d3eec58313bfeb572ebeb09739a413b1df2b7755611f06ef62d8c9cf8e

  • SHA512

    fb6c0231f4821ded9c1fa7045d2581bd816d9dbe792394742b946f7ba76a06e18b84078bef6e0206f5dff2e42145f6e9f9f43829dc567ca571884b60c745f31f

Malware Config

Targets

    • Target

      IHAransom.exe

    • Size

      231KB

    • MD5

      5f775c9a9d49013ef37aa7d332327af4

    • SHA1

      f96eeeaebef8e4d1ed74f7c557ef2a9d3c021bc8

    • SHA256

      6fafb9d3eec58313bfeb572ebeb09739a413b1df2b7755611f06ef62d8c9cf8e

    • SHA512

      fb6c0231f4821ded9c1fa7045d2581bd816d9dbe792394742b946f7ba76a06e18b84078bef6e0206f5dff2e42145f6e9f9f43829dc567ca571884b60c745f31f

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Impact

Defacement

1
T1491

Tasks