General

  • Target

    55faad962e474c35ca96027ac438c8df73d6af4d46d4c32f20b587906c6e3461

  • Size

    302KB

  • Sample

    220725-gzvqvaacej

  • MD5

    83ea3ca1878c8b1015e7ac454fdaf71a

  • SHA1

    39bf2b0da74ce2156dc6f9a5ae2db4a3ceefb441

  • SHA256

    55faad962e474c35ca96027ac438c8df73d6af4d46d4c32f20b587906c6e3461

  • SHA512

    0b29ebf361dfdaa95103944ebc98938480814d7862d7c41bc884aac2da48a9f6a079e406d09a90418121ded1f96b7ba661cb5ad73198d5f62e1a28e595067bc5

Malware Config

Targets

    • Target

      55faad962e474c35ca96027ac438c8df73d6af4d46d4c32f20b587906c6e3461

    • Size

      302KB

    • MD5

      83ea3ca1878c8b1015e7ac454fdaf71a

    • SHA1

      39bf2b0da74ce2156dc6f9a5ae2db4a3ceefb441

    • SHA256

      55faad962e474c35ca96027ac438c8df73d6af4d46d4c32f20b587906c6e3461

    • SHA512

      0b29ebf361dfdaa95103944ebc98938480814d7862d7c41bc884aac2da48a9f6a079e406d09a90418121ded1f96b7ba661cb5ad73198d5f62e1a28e595067bc5

    • suricata: ET MALWARE CryptoWall Check-in

      suricata: ET MALWARE CryptoWall Check-in

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Impact

Inhibit System Recovery

2
T1490

Tasks