General

  • Target

    3a02c1420d40a67f5eb3db1f9c80a857884953676092f81af6cf9e5c2ca223e8

  • Size

    137KB

  • Sample

    220427-wh1yvsbgbp

  • MD5

    88b3e4482431ab7dacca6d143b1a59e3

  • SHA1

    b08941dfd709ce6a9cd30dd09da2ec21f129c4f5

  • SHA256

    3a02c1420d40a67f5eb3db1f9c80a857884953676092f81af6cf9e5c2ca223e8

  • SHA512

    c54f3c497adf3da2c6a5e447bb53436c6c34879bd8ec6aabb479d8af9ce96ccdd29f9b29b9bc9c6a838d59d3f07fbc535a649738cf85f4d7c5d0b72e51da1f99

Malware Config

Targets

    • Target

      3a02c1420d40a67f5eb3db1f9c80a857884953676092f81af6cf9e5c2ca223e8

    • Size

      137KB

    • MD5

      88b3e4482431ab7dacca6d143b1a59e3

    • SHA1

      b08941dfd709ce6a9cd30dd09da2ec21f129c4f5

    • SHA256

      3a02c1420d40a67f5eb3db1f9c80a857884953676092f81af6cf9e5c2ca223e8

    • SHA512

      c54f3c497adf3da2c6a5e447bb53436c6c34879bd8ec6aabb479d8af9ce96ccdd29f9b29b9bc9c6a838d59d3f07fbc535a649738cf85f4d7c5d0b72e51da1f99

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks