General

  • Target

    MAG.msi.bin

  • Size

    96KB

  • Sample

    220523-f331ysfbdm

  • MD5

    957d0c81c985609c580565a0323a14cd

  • SHA1

    d8d46413409a14a1ae407107016e28074c6824d5

  • SHA256

    9180fe1ea22b07841146ba483d454faf092c8cd9fed14222a08b7392cda2e7be

  • SHA512

    0ff024ff07ab13e7d308429fd8906560e58610b63a7dd468f6b5b6c86221962dbc27e93090e5607104201e9cabe90b52affba54411a541f5c2f5369db231cf52

Malware Config

Targets

    • Target

      MAG.msi.bin

    • Size

      96KB

    • MD5

      957d0c81c985609c580565a0323a14cd

    • SHA1

      d8d46413409a14a1ae407107016e28074c6824d5

    • SHA256

      9180fe1ea22b07841146ba483d454faf092c8cd9fed14222a08b7392cda2e7be

    • SHA512

      0ff024ff07ab13e7d308429fd8906560e58610b63a7dd468f6b5b6c86221962dbc27e93090e5607104201e9cabe90b52affba54411a541f5c2f5369db231cf52

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

4
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks