Resubmissions

19-10-2022 21:03

221019-zv2byagfgk 10

19-10-2022 20:57

221019-zr17rsgee8 10

General

  • Target

    123.zip

  • Size

    2.2MB

  • Sample

    221019-zr17rsgee8

  • MD5

    68202621505a0198a68b7afe8200197c

  • SHA1

    22a0314908327691c897ad6cb2fad526e703e2e8

  • SHA256

    fdd2ae3a7ac4e82c84b9cf26c1669122342be929d7158cac317968effeb3676b

  • SHA512

    1ed27d15730b4cde65ebcf4718166bc24c768c809a3119e96620130d2d4bb9bfb8ca062a3a6231890d80f47e073402c72d3ed4fd44b107468626712e05873e1e

  • SSDEEP

    49152:2df//kjv6QtjFC9dlQVzmqRRQc7KQ58q6exfzF1X8CmcBGwf:I3sjrjFc2zfec7h6uzTDmcBrf

Malware Config

Targets

    • Target

      2e87dd5a57f8e99a4bbe841354a61508a3f203650b123f93f2c54c387edc2e91

    • Size

      2.3MB

    • MD5

      bda4570095d3d36645df2753e4207a99

    • SHA1

      222b33e246b3459ffe9ba18fab26ab4fe8ae23bf

    • SHA256

      2e87dd5a57f8e99a4bbe841354a61508a3f203650b123f93f2c54c387edc2e91

    • SHA512

      d0c031f37d3e5c8f6a63311db079519ef7d8af005cccd19f65d10ac19233eb982d287703dce97ae429c977b4c56584ae819f32527ac61b5db700ee7c8cdf9b9b

    • SSDEEP

      49152:rUUYZLKOuuwlWOZsE/KrPnrjFjUbPY4vAzmhSGaM0RtZxsoVeY:rUU8Lalhm7rPVjUzYYAzmIGaM0bZxsj

    • Detecting the common Go functions and variables names used by Snatch ransomware

    • Snatch Ransomware

      Ransomware family generally distributed through RDP bruteforce attacks.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks