General

  • Target

    dd286a4d79d0f4c2b906073c7f46680252ca09c1c39b0dc12c92097c56662876.zip

  • Size

    1.8MB

  • Sample

    220430-dyagqsegh8

  • MD5

    baafe4e67ea321abb34d8352753da9a8

  • SHA1

    d31054b45f730b04d10d6a9039d953c644a46b8b

  • SHA256

    0eb47cce8acbc742dd9d8e73a3c48411c13bdb03d99dfbeafe1ddcb453626f8f

  • SHA512

    5e7dfbac78ff5b9d07b6041369344281338d29d381fef2b87d20c7e529197a499a963186ede6be32f8b85e9b0211b679d1e82c6062c5cd99965b3c4be263c9ca

Malware Config

Extracted

Family

zebrocy

C2

Windows XP Professional x64 Edition

Targets

    • Target

      dd286a4d79d0f4c2b906073c7f46680252ca09c1c39b0dc12c92097c56662876.exe

    • Size

      1.8MB

    • MD5

      057aad993a3ef50f6b3ca2db37cb928a

    • SHA1

      a57592be641738c86c85308ef68148181249bc0b

    • SHA256

      dd286a4d79d0f4c2b906073c7f46680252ca09c1c39b0dc12c92097c56662876

    • SHA512

      87c89027d60f80e99c526584fa093620b3f099151170362424ad78f5e4d7184bd9f2d627ec8463ca202127835f435dd4f85bf2b0d9351593c688855f0bbaffbb

    • SatanCryptor

      Golang ransomware first seen in early 2020.

    • suricata: ET MALWARE Possible Satan Cryptor GeoIP Lookup

      suricata: ET MALWARE Possible Satan Cryptor GeoIP Lookup

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks