General

  • Target

    a898a3c616fab1e3c8f05eacf9ba459af21aefb63937cfc10778e77aaa375b3a

  • Size

    554KB

  • Sample

    220520-3w8zyshfe2

  • MD5

    b2deb3fa1acb774a1e5b17013d474d71

  • SHA1

    e32774f940c4e8bdb19e0d33689bf4f56ab90895

  • SHA256

    a898a3c616fab1e3c8f05eacf9ba459af21aefb63937cfc10778e77aaa375b3a

  • SHA512

    913fc4b339ac0af4c89c3ad2b0af2ef29f245e91befff960bd3b78da9071c8c8457ef1ace01d91e0c2f58bacbd87b7b2f0734c86cd27156ecd837bce035aec8b

Malware Config

Targets

    • Target

      a898a3c616fab1e3c8f05eacf9ba459af21aefb63937cfc10778e77aaa375b3a

    • Size

      554KB

    • MD5

      b2deb3fa1acb774a1e5b17013d474d71

    • SHA1

      e32774f940c4e8bdb19e0d33689bf4f56ab90895

    • SHA256

      a898a3c616fab1e3c8f05eacf9ba459af21aefb63937cfc10778e77aaa375b3a

    • SHA512

      913fc4b339ac0af4c89c3ad2b0af2ef29f245e91befff960bd3b78da9071c8c8457ef1ace01d91e0c2f58bacbd87b7b2f0734c86cd27156ecd837bce035aec8b

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks