General

  • Target

    3ddf1da783551e626ba3575748eb8bc9d92424a910e6841a05f15079ae605566

  • Size

    1.1MB

  • Sample

    220701-rgp3rahbc2

  • MD5

    67602186447c604718f329e4a75efa30

  • SHA1

    da92fac48b831c782fe13704c444518dfab9f43f

  • SHA256

    3ddf1da783551e626ba3575748eb8bc9d92424a910e6841a05f15079ae605566

  • SHA512

    99bc50931bfd4bedacdef49ed52d3270327d6314e661bafeac4c7099f4a95f1c1c555726769898876fafe0fa1c3303797b1a09604bead0795f297c75ff372590

Malware Config

Targets

    • Target

      3ddf1da783551e626ba3575748eb8bc9d92424a910e6841a05f15079ae605566

    • Size

      1.1MB

    • MD5

      67602186447c604718f329e4a75efa30

    • SHA1

      da92fac48b831c782fe13704c444518dfab9f43f

    • SHA256

      3ddf1da783551e626ba3575748eb8bc9d92424a910e6841a05f15079ae605566

    • SHA512

      99bc50931bfd4bedacdef49ed52d3270327d6314e661bafeac4c7099f4a95f1c1c555726769898876fafe0fa1c3303797b1a09604bead0795f297c75ff372590

    • CrypVault

      Ransomware family which makes encrypted files look like they have been quarantined by AV.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks