General

  • Target

    a76dbe766b8e6f8953fecc6f20c2f1b54892c0d1b416c3817dfef983902ee183

  • Size

    853KB

  • Sample

    220520-3f1zeagha4

  • MD5

    ede5bbc69594ab35cd44eead5dc73752

  • SHA1

    32734225f02f0fd4a375313183b692900ee5eeea

  • SHA256

    a76dbe766b8e6f8953fecc6f20c2f1b54892c0d1b416c3817dfef983902ee183

  • SHA512

    22b24fba0d320be89765d6fd9bde2226c2e928c4ef6e9476b69b1ee426c59072949c045c834b357ec747a679b2f613750d3058c46d89a1ec47bfa7622b0a543c

Malware Config

Targets

    • Target

      a76dbe766b8e6f8953fecc6f20c2f1b54892c0d1b416c3817dfef983902ee183

    • Size

      853KB

    • MD5

      ede5bbc69594ab35cd44eead5dc73752

    • SHA1

      32734225f02f0fd4a375313183b692900ee5eeea

    • SHA256

      a76dbe766b8e6f8953fecc6f20c2f1b54892c0d1b416c3817dfef983902ee183

    • SHA512

      22b24fba0d320be89765d6fd9bde2226c2e928c4ef6e9476b69b1ee426c59072949c045c834b357ec747a679b2f613750d3058c46d89a1ec47bfa7622b0a543c

    • Phobos

      Phobos ransomware appeared at the beginning of 2019.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Drops startup file

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

3
T1107

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Impact

Inhibit System Recovery

4
T1490

Tasks