General

  • Target

    9f270cd7efc4844235a0c150a10f1b7d996e6449ba562940b985a3888725bb66

  • Size

    554KB

  • Sample

    220520-31dplscfgq

  • MD5

    4451a75a1f61e9aed428c7cc56455342

  • SHA1

    319a73acaaba48a07284192fb28ad047bf69aaec

  • SHA256

    9f270cd7efc4844235a0c150a10f1b7d996e6449ba562940b985a3888725bb66

  • SHA512

    28c66da46d0ad0909085860a11e0a8f8e701fb78806623f240b221ca6ac2ec0782fdae266d021a73b4336a3d23d335589f3d8bef9d9f46bd98da42dc2901c9b5

Malware Config

Targets

    • Target

      9f270cd7efc4844235a0c150a10f1b7d996e6449ba562940b985a3888725bb66

    • Size

      554KB

    • MD5

      4451a75a1f61e9aed428c7cc56455342

    • SHA1

      319a73acaaba48a07284192fb28ad047bf69aaec

    • SHA256

      9f270cd7efc4844235a0c150a10f1b7d996e6449ba562940b985a3888725bb66

    • SHA512

      28c66da46d0ad0909085860a11e0a8f8e701fb78806623f240b221ca6ac2ec0782fdae266d021a73b4336a3d23d335589f3d8bef9d9f46bd98da42dc2901c9b5

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks