General

  • Target

    ae25dc288f5ef1ecfe4f7d6728a1814020813d2958434a06011778c206f575c9

  • Size

    554KB

  • Sample

    220521-ath2jadgbl

  • MD5

    eae7974d820bd517495222b9a616a5c5

  • SHA1

    ed1344541be0cce3e93177ac577f56fa0b06b9f4

  • SHA256

    ae25dc288f5ef1ecfe4f7d6728a1814020813d2958434a06011778c206f575c9

  • SHA512

    2cc45bdb0b359d65246b731f9b009de68c625fc667bcd5f19d8e5846a7b627af65cb78665f86d9913f398cf734fe00a65480612b4d3c083f6d661434f581c679

Malware Config

Targets

    • Target

      ae25dc288f5ef1ecfe4f7d6728a1814020813d2958434a06011778c206f575c9

    • Size

      554KB

    • MD5

      eae7974d820bd517495222b9a616a5c5

    • SHA1

      ed1344541be0cce3e93177ac577f56fa0b06b9f4

    • SHA256

      ae25dc288f5ef1ecfe4f7d6728a1814020813d2958434a06011778c206f575c9

    • SHA512

      2cc45bdb0b359d65246b731f9b009de68c625fc667bcd5f19d8e5846a7b627af65cb78665f86d9913f398cf734fe00a65480612b4d3c083f6d661434f581c679

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks