General

  • Target

    666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6

  • Size

    323KB

  • Sample

    220701-d7p9jsccg9

  • MD5

    dfe0390e501faf0de5ba5093304e8ac2

  • SHA1

    266ca584a811b8ccd4d513a0b007d206575a60a9

  • SHA256

    666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6

  • SHA512

    0423b083ada2a6c201cf777d14e74e73d9484c9f34f8681e86e4265e80ee50a5c454c55c5d6e9dbc858abeb97c28bd51d44fe4dd113a7a54ebe6a15241de7373

Malware Config

Targets

    • Target

      666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6

    • Size

      323KB

    • MD5

      dfe0390e501faf0de5ba5093304e8ac2

    • SHA1

      266ca584a811b8ccd4d513a0b007d206575a60a9

    • SHA256

      666a3daa2ef51e1b14e0abeddecce8ba836a27cc37781899c88a3b6f328d17e6

    • SHA512

      0423b083ada2a6c201cf777d14e74e73d9484c9f34f8681e86e4265e80ee50a5c454c55c5d6e9dbc858abeb97c28bd51d44fe4dd113a7a54ebe6a15241de7373

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

2
T1490

Tasks