General

  • Target

    4f8a51b563e832c4660a2e674580d91dc46294447f6971b9916285dab28bd4b2

  • Size

    554KB

  • Sample

    220520-2an7zsabaj

  • MD5

    599b93918efa98ba6cea5e14cc47fa80

  • SHA1

    94c7c7c89be2e3c866b81fb352586a70f91414c3

  • SHA256

    4f8a51b563e832c4660a2e674580d91dc46294447f6971b9916285dab28bd4b2

  • SHA512

    d98fbee1d19c46aa8297065b2f7b4690033534d07deb156962f0d42b9d7ad20aca44a1fca1666fd624c2e5f3320e4ab891c519a6d1e057c89b4cd5afecd5279c

Malware Config

Targets

    • Target

      4f8a51b563e832c4660a2e674580d91dc46294447f6971b9916285dab28bd4b2

    • Size

      554KB

    • MD5

      599b93918efa98ba6cea5e14cc47fa80

    • SHA1

      94c7c7c89be2e3c866b81fb352586a70f91414c3

    • SHA256

      4f8a51b563e832c4660a2e674580d91dc46294447f6971b9916285dab28bd4b2

    • SHA512

      d98fbee1d19c46aa8297065b2f7b4690033534d07deb156962f0d42b9d7ad20aca44a1fca1666fd624c2e5f3320e4ab891c519a6d1e057c89b4cd5afecd5279c

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks