General

  • Target

    a6d128fa03e0eaa64d4f8ca33cd60877e3ea07017118343e488f6f4f756f3e4c

  • Size

    554KB

  • Sample

    220520-2bwnfsabeq

  • MD5

    3d76b704c05db2f5b5a988c365a3bf4a

  • SHA1

    3f63d23d0fa184b52487825e2f38d89d911500d5

  • SHA256

    a6d128fa03e0eaa64d4f8ca33cd60877e3ea07017118343e488f6f4f756f3e4c

  • SHA512

    623aada9be29beeda4398c6160fb1bef0e7b90c4ff010bf4e5e16b8187ec4eb017be34b384ca98c116890562cf7d1625e94e00cbb2c6b1389fca1bd52a347f18

Malware Config

Targets

    • Target

      a6d128fa03e0eaa64d4f8ca33cd60877e3ea07017118343e488f6f4f756f3e4c

    • Size

      554KB

    • MD5

      3d76b704c05db2f5b5a988c365a3bf4a

    • SHA1

      3f63d23d0fa184b52487825e2f38d89d911500d5

    • SHA256

      a6d128fa03e0eaa64d4f8ca33cd60877e3ea07017118343e488f6f4f756f3e4c

    • SHA512

      623aada9be29beeda4398c6160fb1bef0e7b90c4ff010bf4e5e16b8187ec4eb017be34b384ca98c116890562cf7d1625e94e00cbb2c6b1389fca1bd52a347f18

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks