General

  • Target

    6356a267a78aa9bb9c21b81d13586b1dc6ecec44faf6e3af2005a3ae07a611a1

  • Size

    554KB

  • Sample

    220521-avtvesdggn

  • MD5

    94d229fc107533eb550d04b03cc41afb

  • SHA1

    7b4acea67134d35d128620ae94a4dbe38287b37b

  • SHA256

    6356a267a78aa9bb9c21b81d13586b1dc6ecec44faf6e3af2005a3ae07a611a1

  • SHA512

    7b2cd57aeb97d43ac50c5d942a6bd83cbda8e0bc8f2c2f25b6a0fb150108ec5900c8cfcf1fd347f3b4f5d2b1eb9ec6bae41f12881e8927fd2130ea3ccd772ffb

Malware Config

Targets

    • Target

      6356a267a78aa9bb9c21b81d13586b1dc6ecec44faf6e3af2005a3ae07a611a1

    • Size

      554KB

    • MD5

      94d229fc107533eb550d04b03cc41afb

    • SHA1

      7b4acea67134d35d128620ae94a4dbe38287b37b

    • SHA256

      6356a267a78aa9bb9c21b81d13586b1dc6ecec44faf6e3af2005a3ae07a611a1

    • SHA512

      7b2cd57aeb97d43ac50c5d942a6bd83cbda8e0bc8f2c2f25b6a0fb150108ec5900c8cfcf1fd347f3b4f5d2b1eb9ec6bae41f12881e8927fd2130ea3ccd772ffb

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks