General

  • Target

    ca680208fb28dca0595ca9f677c7845aca09c1979db0a9d680ad6f6bf30b7097

  • Size

    68KB

  • Sample

    220511-26872afbfr

  • MD5

    f269d24544e8bb4cb82680bb396a5f1b

  • SHA1

    8283f4266a7782308b04a3d03c8b13a38eefaa61

  • SHA256

    ca680208fb28dca0595ca9f677c7845aca09c1979db0a9d680ad6f6bf30b7097

  • SHA512

    c22f51697316c4d29e4b4ef817a1c73d4681fc02b0a2b0fee01e2aaf065d6a3aa04b7defc366cea012a723e600bd80a12083d54bb0907fa0b4cf6f12c41e68d1

Malware Config

Targets

    • Target

      ca680208fb28dca0595ca9f677c7845aca09c1979db0a9d680ad6f6bf30b7097

    • Size

      68KB

    • MD5

      f269d24544e8bb4cb82680bb396a5f1b

    • SHA1

      8283f4266a7782308b04a3d03c8b13a38eefaa61

    • SHA256

      ca680208fb28dca0595ca9f677c7845aca09c1979db0a9d680ad6f6bf30b7097

    • SHA512

      c22f51697316c4d29e4b4ef817a1c73d4681fc02b0a2b0fee01e2aaf065d6a3aa04b7defc366cea012a723e600bd80a12083d54bb0907fa0b4cf6f12c41e68d1

    • Exorcist Ransomware

      Ransomware-as-a-service which avoids infecting machines in CIS nations. First seen in mid-2020.

    • suricata: ET MALWARE Exorcist 2.0 Ransomware CnC Activity

      suricata: ET MALWARE Exorcist 2.0 Ransomware CnC Activity

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

File Deletion

2
T1107

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks