General

  • Target

    Trojan-Ransom.Win32.PornoBlocker.eknr-a3c508ce5ec079fbd0201301e72101ebeafaf39b972525a175fd5c5d46e7fb04

  • Size

    16KB

  • Sample

    221009-lq894aggc6

  • MD5

    ac8cf2a6823223ea1d14f1b7667bb8a3

  • SHA1

    e3381a9d85cb45b11518aee0aab2bff20ad7d598

  • SHA256

    a3c508ce5ec079fbd0201301e72101ebeafaf39b972525a175fd5c5d46e7fb04

  • SHA512

    9d6f47ec48c0e4c959ee8e694a3093dc0516599e05adf722f081d67d8f1a2d44aa030e1512dbe2945f4d2eee62902ee632f313a73db4f87e481ffc14980db39a

  • SSDEEP

    384:DWqcjhTYwT5B+ItfPt7q+LJugRImI5uXlYV1z70iJkzo9:DWptSwfFq+LJ9C2lKJ82

Score
8/10

Malware Config

Targets

    • Target

      Edius_v6.02_的破解文件/lpk.dll

    • Size

      61KB

    • MD5

      c7dd44964be170becb663dc49a229f1f

    • SHA1

      5be47ba7be673ce010a00726eea84b0c44ee6801

    • SHA256

      d9ac567d4177608d9ceef753e44bbe3f7a534074f627131ac7441af41faa1b8e

    • SHA512

      ea36e76ba70576ee92ff45eb1db52dbf2a28692cab2979b9acca3ec49fd538f58fae30b1dcb53f91d9af5aca7d95adc4d9dd467285c05ff006c48ae9f4ac0a4f

    • SSDEEP

      1536:KNt2E5lBYVKYN4b1HZooqfZ9zksBXNt2E5l:talWKC4b1HZooqB9dB+al

    Score
    8/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks