General

  • Target

    f048d645993b4b855dd76e5a5227b00bfa25e9a56c88b1a5c879d3cc8d0db42b

  • Size

    994KB

  • Sample

    220212-ankceafecn

  • MD5

    01dff1137a649d446b9468cfc2d57abb

  • SHA1

    23f971f8a2feae189b1a6c715a196accb46a342b

  • SHA256

    f048d645993b4b855dd76e5a5227b00bfa25e9a56c88b1a5c879d3cc8d0db42b

  • SHA512

    3d4d3c5d7e3598a9a3d970d280d51b379eeeca43dc5f371f74e40963cfeb8cdd538de049de65d20caa4ee260eb7d461de2eba2718ff19425a493225d864b2ad0

Malware Config

Targets

    • Target

      f048d645993b4b855dd76e5a5227b00bfa25e9a56c88b1a5c879d3cc8d0db42b

    • Size

      994KB

    • MD5

      01dff1137a649d446b9468cfc2d57abb

    • SHA1

      23f971f8a2feae189b1a6c715a196accb46a342b

    • SHA256

      f048d645993b4b855dd76e5a5227b00bfa25e9a56c88b1a5c879d3cc8d0db42b

    • SHA512

      3d4d3c5d7e3598a9a3d970d280d51b379eeeca43dc5f371f74e40963cfeb8cdd538de049de65d20caa4ee260eb7d461de2eba2718ff19425a493225d864b2ad0

    • Ouroboros/Zeropadypt

      Ransomware family based on open-source CryptoWire.

    • Modifies Windows Firewall

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Tasks