General

  • Target

    0822aba5ae3a202584bcf7289ea3fcac9b4108cd387e7688a2cf6a1d7691327c

  • Size

    994KB

  • Sample

    220212-axj31aeah2

  • MD5

    59121158ef88411544355a5bf293297c

  • SHA1

    636510582fb27d2a23da35eeb55ef577f52caf68

  • SHA256

    0822aba5ae3a202584bcf7289ea3fcac9b4108cd387e7688a2cf6a1d7691327c

  • SHA512

    fefbe9c3289f3cb410ddd8e742b3d27fba035827764aad47d304b9f0f23aef89a7215d85c6371c9900898b2b332b8b3a45a7fc117e33c43928f22b695609d4e2

Malware Config

Targets

    • Target

      0822aba5ae3a202584bcf7289ea3fcac9b4108cd387e7688a2cf6a1d7691327c

    • Size

      994KB

    • MD5

      59121158ef88411544355a5bf293297c

    • SHA1

      636510582fb27d2a23da35eeb55ef577f52caf68

    • SHA256

      0822aba5ae3a202584bcf7289ea3fcac9b4108cd387e7688a2cf6a1d7691327c

    • SHA512

      fefbe9c3289f3cb410ddd8e742b3d27fba035827764aad47d304b9f0f23aef89a7215d85c6371c9900898b2b332b8b3a45a7fc117e33c43928f22b695609d4e2

    • Ouroboros/Zeropadypt

      Ransomware family based on open-source CryptoWire.

    • Modifies Windows Firewall

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Tasks