General

  • Target

    b73ad1034f549ee2133928c81ad1960e3378e21a6ab0c71fbc08ebb21c6681bb

  • Size

    554KB

  • Sample

    220521-m1q2yacgh6

  • MD5

    35ef3d04fc9440361c1d7c075c9aa3f8

  • SHA1

    f4110a2517c36f4af887f4b852d93e755bc18e33

  • SHA256

    b73ad1034f549ee2133928c81ad1960e3378e21a6ab0c71fbc08ebb21c6681bb

  • SHA512

    662cdaa3c9a26e4c020b6a25f7a5664c51c7e72a91ab8d4ffaa6890efeaba1930318646007e96f818e1323c13dfd66849c07c95cb4cbe3fd4133ad9fbc65572d

Malware Config

Targets

    • Target

      b73ad1034f549ee2133928c81ad1960e3378e21a6ab0c71fbc08ebb21c6681bb

    • Size

      554KB

    • MD5

      35ef3d04fc9440361c1d7c075c9aa3f8

    • SHA1

      f4110a2517c36f4af887f4b852d93e755bc18e33

    • SHA256

      b73ad1034f549ee2133928c81ad1960e3378e21a6ab0c71fbc08ebb21c6681bb

    • SHA512

      662cdaa3c9a26e4c020b6a25f7a5664c51c7e72a91ab8d4ffaa6890efeaba1930318646007e96f818e1323c13dfd66849c07c95cb4cbe3fd4133ad9fbc65572d

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks