General

  • Target

    d20add24db21888a00129eca3e0313d86faebfed31aab4f273e8e714ed1bfbbd

  • Size

    994KB

  • Sample

    220212-apehjsfedk

  • MD5

    1a01257e979825ddd98a39b8f2f9994a

  • SHA1

    d77114c5e32c3cc5904eea994ad23976c01d4c5c

  • SHA256

    d20add24db21888a00129eca3e0313d86faebfed31aab4f273e8e714ed1bfbbd

  • SHA512

    7bd5e7f0d3e9dac8cab9374fc3c8afcce5e92dcfd4ae91db6d40bdfa8f12ad969e3b7b0d39e4e717c85d4c2ea6ca421e01a93055f77bcd84b94c6dfabaff43c2

Malware Config

Targets

    • Target

      d20add24db21888a00129eca3e0313d86faebfed31aab4f273e8e714ed1bfbbd

    • Size

      994KB

    • MD5

      1a01257e979825ddd98a39b8f2f9994a

    • SHA1

      d77114c5e32c3cc5904eea994ad23976c01d4c5c

    • SHA256

      d20add24db21888a00129eca3e0313d86faebfed31aab4f273e8e714ed1bfbbd

    • SHA512

      7bd5e7f0d3e9dac8cab9374fc3c8afcce5e92dcfd4ae91db6d40bdfa8f12ad969e3b7b0d39e4e717c85d4c2ea6ca421e01a93055f77bcd84b94c6dfabaff43c2

    • Ouroboros/Zeropadypt

      Ransomware family based on open-source CryptoWire.

    • Modifies Windows Firewall

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks