General

  • Target

    8341f474da5bf6dde8ecfdd662bad56e3bbdd6c1362d795e9e7b9b6e13e1490d

  • Size

    433KB

  • Sample

    220305-yfsktahbb7

  • MD5

    89510b41b6a12ae16bd4d7bc1193c2fe

  • SHA1

    10b16616fe415702945deaec38b3dcd42b178fb2

  • SHA256

    8341f474da5bf6dde8ecfdd662bad56e3bbdd6c1362d795e9e7b9b6e13e1490d

  • SHA512

    e2c89e8d48a8b1ad2d16cd10c620091ae0286cf7b520c52ce201dbc227fc6df22b7424d29d251658baaa6d288cf78ffb037e158eab01514913e3563a0367901b

Malware Config

Targets

    • Target

      8341f474da5bf6dde8ecfdd662bad56e3bbdd6c1362d795e9e7b9b6e13e1490d

    • Size

      433KB

    • MD5

      89510b41b6a12ae16bd4d7bc1193c2fe

    • SHA1

      10b16616fe415702945deaec38b3dcd42b178fb2

    • SHA256

      8341f474da5bf6dde8ecfdd662bad56e3bbdd6c1362d795e9e7b9b6e13e1490d

    • SHA512

      e2c89e8d48a8b1ad2d16cd10c620091ae0286cf7b520c52ce201dbc227fc6df22b7424d29d251658baaa6d288cf78ffb037e158eab01514913e3563a0367901b

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks