General

  • Target

    5c322c7f3b22aa8c598a875dd9b28917fd1c5b8d20d12ca59cb4074af269269b

  • Size

    1.5MB

  • Sample

    220305-3x1d7shfa4

  • MD5

    bafc669bbbeecb46825d0970f4e134b5

  • SHA1

    39d642ca982ddd4c36eb0561df5da2e03645581d

  • SHA256

    5c322c7f3b22aa8c598a875dd9b28917fd1c5b8d20d12ca59cb4074af269269b

  • SHA512

    506d11288f5fb3e75663e3314add9253a4e237f8725f34d4c1fdec2bd467274fb5d16cac1ed241fb929e3786eb69d5507317443fcf1fad01cf7ed719e5437033

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://myexternalip.com/raw

Targets

    • Target

      5c322c7f3b22aa8c598a875dd9b28917fd1c5b8d20d12ca59cb4074af269269b

    • Size

      1.5MB

    • MD5

      bafc669bbbeecb46825d0970f4e134b5

    • SHA1

      39d642ca982ddd4c36eb0561df5da2e03645581d

    • SHA256

      5c322c7f3b22aa8c598a875dd9b28917fd1c5b8d20d12ca59cb4074af269269b

    • SHA512

      506d11288f5fb3e75663e3314add9253a4e237f8725f34d4c1fdec2bd467274fb5d16cac1ed241fb929e3786eb69d5507317443fcf1fad01cf7ed719e5437033

    • Matrix Ransomware

      Targeted ransomware with information collection and encryption functionality.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Sets service image path in registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks