General

  • Target

    502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36

  • Size

    206KB

  • Sample

    220419-qrcpqsead4

  • MD5

    185fbc550a671187d6aeb3db3bdb22f8

  • SHA1

    bf80ac2aa2e0f854366d987f240c780a230f40c5

  • SHA256

    502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36

  • SHA512

    7524b4dba73dc03f83af3ab2bdca4fe65fccb145b4933103b624819603cc6999c4cb42e75fb4c0f5b33ea0d9a7f2bc29b9dfff6460abdcb3acfac29370bf5be5

Malware Config

Targets

    • Target

      502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36

    • Size

      206KB

    • MD5

      185fbc550a671187d6aeb3db3bdb22f8

    • SHA1

      bf80ac2aa2e0f854366d987f240c780a230f40c5

    • SHA256

      502a0ec50a6c571ed5080e8c1f0194d95883a70b87f605647e6702f5fbd5cd36

    • SHA512

      7524b4dba73dc03f83af3ab2bdca4fe65fccb145b4933103b624819603cc6999c4cb42e75fb4c0f5b33ea0d9a7f2bc29b9dfff6460abdcb3acfac29370bf5be5

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks