General

  • Target

    94afdfe738467eae8094ba37281096fddffa7970a31a688c934c92dc0fac4eb1

  • Size

    1.0MB

  • Sample

    220212-ark34sfefj

  • MD5

    4d4c7db3318f4c6e7988c0df757513bc

  • SHA1

    5cba2c8b3cc9d78a5e3e95b7d5c0675c86834795

  • SHA256

    94afdfe738467eae8094ba37281096fddffa7970a31a688c934c92dc0fac4eb1

  • SHA512

    268639d6a7959828224e011587e293233d1282b4e23a03dec9832e5a3d74b9a01d99de19c8eab9c8618c79991adb81db6c34a93c67d87be6021167924401dca3

Score
10/10

Malware Config

Targets

    • Target

      94afdfe738467eae8094ba37281096fddffa7970a31a688c934c92dc0fac4eb1

    • Size

      1.0MB

    • MD5

      4d4c7db3318f4c6e7988c0df757513bc

    • SHA1

      5cba2c8b3cc9d78a5e3e95b7d5c0675c86834795

    • SHA256

      94afdfe738467eae8094ba37281096fddffa7970a31a688c934c92dc0fac4eb1

    • SHA512

      268639d6a7959828224e011587e293233d1282b4e23a03dec9832e5a3d74b9a01d99de19c8eab9c8618c79991adb81db6c34a93c67d87be6021167924401dca3

    Score
    10/10
    • Ouroboros/Zeropadypt

      Ransomware family based on open-source CryptoWire.

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks