General

  • Target

    PulseSecure.x64.msi

  • Size

    27.0MB

  • Sample

    220405-reqlhagdh2

  • MD5

    4a743fbe0ccfc7dc593281803a07949e

  • SHA1

    efcaf34a6a7591d3fb8768bae15db671095e5dd0

  • SHA256

    78be59991f40ec589c204bb1c879aaaceee6e5ce108876558db65f207705881e

  • SHA512

    d85515b611594148351722db179b64c25023a924f6ccec917a17fedcb5f1ce541b8d075f3c5378e831416416dff52eaa10c54bfc9f84633c6db5aaf059e36b57

Malware Config

Targets

    • Target

      PulseSecure.x64.msi

    • Size

      27.0MB

    • MD5

      4a743fbe0ccfc7dc593281803a07949e

    • SHA1

      efcaf34a6a7591d3fb8768bae15db671095e5dd0

    • SHA256

      78be59991f40ec589c204bb1c879aaaceee6e5ce108876558db65f207705881e

    • SHA512

      d85515b611594148351722db179b64c25023a924f6ccec917a17fedcb5f1ce541b8d075f3c5378e831416416dff52eaa10c54bfc9f84633c6db5aaf059e36b57

    • Detected Egregor ransomware

    • Egregor Ransomware

      Variant of the Sekhmet ransomware first seen in September 2020.

    • Registers COM server for autorun

    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Modifies file permissions

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

File Permissions Modification

1
T1222

Modify Registry

2
T1112

Discovery

Query Registry

5
T1012

System Information Discovery

5
T1082

Peripheral Device Discovery

2
T1120

Tasks