General

  • Target

    slam.ransomware.builder.installer.exe

  • Size

    4.6MB

  • Sample

    220523-wx1lmsagg6

  • MD5

    8b7d969472f6fb21ab16d5c924694a5a

  • SHA1

    96340005d852261fae668e25a913e6fb9dbf5ab0

  • SHA256

    534f55bc067f21e2e14034d4278694aacd420d1d19e94f88d318ec3860fd6690

  • SHA512

    3eb327d9f838121887428becbccf7ced8d93959d8d2cdc1416e3bd6edf731449ac3a9c7fcf3eaae33787074161b7a9660ef2452621cc9c2e6300be6328ae4d32

Score
10/10

Malware Config

Extracted

Path

C:\slam_ransomware_builder\README.txt

Ransom Note
ALL YOUR FILES HAVE BEEN ENCRYPTED BY THE SLAM RANSOMWARE Admin

Extracted

Path

C:\Users\Admin\Desktop\README.txt

Ransom Note
ALL YOUR FILES HAVE BEEN ENCRYPTED BY THE SLAM RANSOMWARE Admin

Targets

    • Target

      slam.ransomware.builder.installer.exe

    • Size

      4.6MB

    • MD5

      8b7d969472f6fb21ab16d5c924694a5a

    • SHA1

      96340005d852261fae668e25a913e6fb9dbf5ab0

    • SHA256

      534f55bc067f21e2e14034d4278694aacd420d1d19e94f88d318ec3860fd6690

    • SHA512

      3eb327d9f838121887428becbccf7ced8d93959d8d2cdc1416e3bd6edf731449ac3a9c7fcf3eaae33787074161b7a9660ef2452621cc9c2e6300be6328ae4d32

    Score
    10/10
    • Executes dropped EXE

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Drops desktop.ini file(s)

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Tasks