Resubmissions

23-01-2023 08:52

230123-kswaksce58 8

25-10-2022 11:24

221025-nhs91scebp 9

General

  • Target

    slamransomware2.1.exe

  • Size

    3.9MB

  • Sample

    221025-nhs91scebp

  • MD5

    b4c5397ba985fe7770a4822f28343198

  • SHA1

    18bb6536a8caa53fa006b0e78d4c4097ecee583f

  • SHA256

    acb3d1eab482ba2428084e53cc04fbe08fed4c603861e9ce116b4e9aad2096cf

  • SHA512

    c8b2ce7b61c5fda173ce404c4ca602a794db016a942a44fe50236dd3a54c047fb022c2772446e87744caeb5da02a3111e9169a0cebf83fca2e5c57fd765e3013

  • SSDEEP

    49152:nbX8LRHjOGjBlB4XyGOkNdVxzyK8LRHjOGjBlB4XyGOkNdV5A:bX88cIyGOk3188cIyGOk3jA

Malware Config

Targets

    • Target

      slamransomware2.1.exe

    • Size

      3.9MB

    • MD5

      b4c5397ba985fe7770a4822f28343198

    • SHA1

      18bb6536a8caa53fa006b0e78d4c4097ecee583f

    • SHA256

      acb3d1eab482ba2428084e53cc04fbe08fed4c603861e9ce116b4e9aad2096cf

    • SHA512

      c8b2ce7b61c5fda173ce404c4ca602a794db016a942a44fe50236dd3a54c047fb022c2772446e87744caeb5da02a3111e9169a0cebf83fca2e5c57fd765e3013

    • SSDEEP

      49152:nbX8LRHjOGjBlB4XyGOkNdVxzyK8LRHjOGjBlB4XyGOkNdV5A:bX88cIyGOk3188cIyGOk3jA

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Possible privilege escalation attempt

    • Loads dropped DLL

    • Modifies file permissions

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Bootkit

1
T1067

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

File Deletion

2
T1107

File Permissions Modification

1
T1222

Modify Registry

4
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Impact

Inhibit System Recovery

2
T1490

Defacement

1
T1491

Tasks