General

  • Target

    bf51b9a34c195241c646a4088607e1db7079e56fe733a206ae34c70ecfd8ca1f

  • Size

    987KB

  • Sample

    211223-s7y9saahgk

  • MD5

    15f32a4ee7b75aefa308866b4bd79539

  • SHA1

    e106a83bf1a5bf23fde2ee2669a580ccd7104f8b

  • SHA256

    bf51b9a34c195241c646a4088607e1db7079e56fe733a206ae34c70ecfd8ca1f

  • SHA512

    3b5f7bbe45b382f0ef15376a92597bca15a6f4b9d3ccba097b588ad6568f1aecd7cf58431045b34359860da8ac17b64deb678597010b423150c63f656d7ff199

Malware Config

Targets

    • Target

      bf51b9a34c195241c646a4088607e1db7079e56fe733a206ae34c70ecfd8ca1f

    • Size

      987KB

    • MD5

      15f32a4ee7b75aefa308866b4bd79539

    • SHA1

      e106a83bf1a5bf23fde2ee2669a580ccd7104f8b

    • SHA256

      bf51b9a34c195241c646a4088607e1db7079e56fe733a206ae34c70ecfd8ca1f

    • SHA512

      3b5f7bbe45b382f0ef15376a92597bca15a6f4b9d3ccba097b588ad6568f1aecd7cf58431045b34359860da8ac17b64deb678597010b423150c63f656d7ff199

    • Ouroboros/Zeropadypt

      Ransomware family based on open-source CryptoWire.

    • Modifies Windows Firewall

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Modify Existing Service

1
T1031

Credential Access

Credentials in Files

1
T1081

Lateral Movement

Replication Through Removable Media

1
T1091

Collection

Data from Local System

1
T1005

Tasks