General

  • Target

    08a84b486c036d689195a1da40e42ad7b87ff133dd0d460e91b2b5863be32f48

  • Size

    232KB

  • Sample

    221004-c3p8bahdb6

  • MD5

    5bb5f129ce3fc8893dd7dd6a17a4f2c0

  • SHA1

    1f4ab9aeea449fceb93d8ce0059c2868dc20cc29

  • SHA256

    08a84b486c036d689195a1da40e42ad7b87ff133dd0d460e91b2b5863be32f48

  • SHA512

    2040d477b4686afdc1551ab4c3dbeec3a58548a713afc4c26e50663f1e042b1e659175a019b734219d69b2194c8c9c487694de347757f9cf66e294d56efaf24f

  • SSDEEP

    6144:01VDCiamd0vcjCHCGfGO3xiku+Pjvx/cp:6VKs0vc2iGP3i+7+

Malware Config

Targets

    • Target

      08a84b486c036d689195a1da40e42ad7b87ff133dd0d460e91b2b5863be32f48

    • Size

      232KB

    • MD5

      5bb5f129ce3fc8893dd7dd6a17a4f2c0

    • SHA1

      1f4ab9aeea449fceb93d8ce0059c2868dc20cc29

    • SHA256

      08a84b486c036d689195a1da40e42ad7b87ff133dd0d460e91b2b5863be32f48

    • SHA512

      2040d477b4686afdc1551ab4c3dbeec3a58548a713afc4c26e50663f1e042b1e659175a019b734219d69b2194c8c9c487694de347757f9cf66e294d56efaf24f

    • SSDEEP

      6144:01VDCiamd0vcjCHCGfGO3xiku+Pjvx/cp:6VKs0vc2iGP3i+7+

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks