General

  • Target

    23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e

  • Size

    404KB

  • Sample

    220612-azj6safacn

  • MD5

    faba065344e5f585a8e7acfce2ffff5f

  • SHA1

    bdbbc7f1ec213771a593dfc8f273e2c0b28a46af

  • SHA256

    23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e

  • SHA512

    ea128b2e682085bf41fc5b322f89ea4d8c1f6090bdf723d688818f91e3e6395a05368c1029ca7c647d90e4bce118ddea9f19fd4b73938636862d2047c664986e

Malware Config

Targets

    • Target

      23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e

    • Size

      404KB

    • MD5

      faba065344e5f585a8e7acfce2ffff5f

    • SHA1

      bdbbc7f1ec213771a593dfc8f273e2c0b28a46af

    • SHA256

      23b61ce11f2a64fe00b92584657f884bd7a7b39b1160d9e006bfec83cec1921e

    • SHA512

      ea128b2e682085bf41fc5b322f89ea4d8c1f6090bdf723d688818f91e3e6395a05368c1029ca7c647d90e4bce118ddea9f19fd4b73938636862d2047c664986e

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

2
T1490

Tasks