Resubmissions

04-11-2021 15:34

211104-sz21psghe5 10

29-10-2021 15:29

211029-swzq6saccp 10

29-10-2021 07:07

211029-hxtanshefl 8

General

  • Target

    Worker-1.exe

  • Size

    385KB

  • Sample

    211104-sz21psghe5

  • MD5

    7677a593678d9c4552578fab18a27384

  • SHA1

    5c3b0d278df728c67122ac3ab7184c3f9ebfaa4f

  • SHA256

    2c6802679ce8ac5ed90bd25d25805e284c7dd5269f7805c68cc5fd965a0adc21

  • SHA512

    8bbce3eefabf7e7d900ba3fa0a42ca3be265425c8b5675e27839a1397d1653ae54e3abbd8a6b0b8ff7ab44d130afb1a81d04d57af42dc45e7227d676a335e082

Malware Config

Targets

    • Target

      Worker-1.exe

    • Size

      385KB

    • MD5

      7677a593678d9c4552578fab18a27384

    • SHA1

      5c3b0d278df728c67122ac3ab7184c3f9ebfaa4f

    • SHA256

      2c6802679ce8ac5ed90bd25d25805e284c7dd5269f7805c68cc5fd965a0adc21

    • SHA512

      8bbce3eefabf7e7d900ba3fa0a42ca3be265425c8b5675e27839a1397d1653ae54e3abbd8a6b0b8ff7ab44d130afb1a81d04d57af42dc45e7227d676a335e082

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Downloads PsExec from SysInternals website

      Sysinternals tools like PsExec are often leveraged maliciously by malware families due to being commonly used by testers/administrators.

    • Modifies Windows Firewall

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies WinLogon

MITRE ATT&CK Enterprise v6

Tasks