General

  • Target

    45ff13207c97a6e00f90b7ece1446d4d853de7141c45c68113d7d8b7746a63ed

  • Size

    554KB

  • Sample

    220520-2vwgssbafn

  • MD5

    e23c0030c07194dc6b74fa3aac3e4f55

  • SHA1

    66333fbf9d4e3e069f5ad985ea80c497c04e98b7

  • SHA256

    45ff13207c97a6e00f90b7ece1446d4d853de7141c45c68113d7d8b7746a63ed

  • SHA512

    3f36f4c3c1e4fec599a403fd4321b8dc6e73ad160be4c321072a1cff0421ad53d5feddd46d2c6c8bc4c9951e6d863bc3e33452854cdaea3d3db4fce9503ab40a

Malware Config

Targets

    • Target

      45ff13207c97a6e00f90b7ece1446d4d853de7141c45c68113d7d8b7746a63ed

    • Size

      554KB

    • MD5

      e23c0030c07194dc6b74fa3aac3e4f55

    • SHA1

      66333fbf9d4e3e069f5ad985ea80c497c04e98b7

    • SHA256

      45ff13207c97a6e00f90b7ece1446d4d853de7141c45c68113d7d8b7746a63ed

    • SHA512

      3f36f4c3c1e4fec599a403fd4321b8dc6e73ad160be4c321072a1cff0421ad53d5feddd46d2c6c8bc4c9951e6d863bc3e33452854cdaea3d3db4fce9503ab40a

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks