General

  • Target

    78b55ce394011b701be630417507f517df542361758ca2ab4c135023e2566c51

  • Size

    554KB

  • Sample

    220520-175essegh5

  • MD5

    9038c0bfcb41767a7b8d1a46652d53e2

  • SHA1

    372dea083bcbbe7f494992f92b5559cf2dab11c7

  • SHA256

    78b55ce394011b701be630417507f517df542361758ca2ab4c135023e2566c51

  • SHA512

    66c153d4e7de01de62775eb57f839f72bb185cb76e82cc12ff875287232fb8d9798bef909d94f10e43f766c0317988a98aa03ff7444b1ba97a5aeebe0858aa3d

Malware Config

Targets

    • Target

      78b55ce394011b701be630417507f517df542361758ca2ab4c135023e2566c51

    • Size

      554KB

    • MD5

      9038c0bfcb41767a7b8d1a46652d53e2

    • SHA1

      372dea083bcbbe7f494992f92b5559cf2dab11c7

    • SHA256

      78b55ce394011b701be630417507f517df542361758ca2ab4c135023e2566c51

    • SHA512

      66c153d4e7de01de62775eb57f839f72bb185cb76e82cc12ff875287232fb8d9798bef909d94f10e43f766c0317988a98aa03ff7444b1ba97a5aeebe0858aa3d

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks