General

  • Target

    fbebb86bb85113fa75d10309be7dc158e2b3ae09a800ae909e701b9c2028f58c

  • Size

    994KB

  • Sample

    220212-amrebseaa7

  • MD5

    7748cd256ffcbf262761607ddb75bb38

  • SHA1

    eef70ff4314467d0abfa757916600062bac584fb

  • SHA256

    fbebb86bb85113fa75d10309be7dc158e2b3ae09a800ae909e701b9c2028f58c

  • SHA512

    1fb7b60d8c002ff83d2ab44c6e02e624676595e3d142c3c4dab5a6d84b83401a4ca590ac68bdae85e78a2cd02cdba4769e50d6faaa68c2f318837ad14aba35ff

Malware Config

Targets

    • Target

      fbebb86bb85113fa75d10309be7dc158e2b3ae09a800ae909e701b9c2028f58c

    • Size

      994KB

    • MD5

      7748cd256ffcbf262761607ddb75bb38

    • SHA1

      eef70ff4314467d0abfa757916600062bac584fb

    • SHA256

      fbebb86bb85113fa75d10309be7dc158e2b3ae09a800ae909e701b9c2028f58c

    • SHA512

      1fb7b60d8c002ff83d2ab44c6e02e624676595e3d142c3c4dab5a6d84b83401a4ca590ac68bdae85e78a2cd02cdba4769e50d6faaa68c2f318837ad14aba35ff

    • Ouroboros/Zeropadypt

      Ransomware family based on open-source CryptoWire.

    • Modifies Windows Firewall

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Tasks