General

  • Target

    267ea3542987795c6e34298e5e43efbd9681db006901aecd23824122a810e437

  • Size

    286KB

  • Sample

    221123-r4rvvsdc9y

  • MD5

    5cb43bf4b7e5329caa8d51f59f8774d5

  • SHA1

    5cf6138ddfba03f6922e15894f47a23e69bebc2c

  • SHA256

    267ea3542987795c6e34298e5e43efbd9681db006901aecd23824122a810e437

  • SHA512

    9858b482d9c82f50f683ec6dbb48ebb937af8cf515cf6be0b933b1873fad3708d506d421376593cbcd01e606efc61e01886c66f9dc2704d6c2d97727e0960081

  • SSDEEP

    3072:dRbZEXlwNqK5HzGyx6jZ8UA7z9YP3vYcghUg1ObLt:d1dqNT3JghS5

Malware Config

Targets

    • Target

      267ea3542987795c6e34298e5e43efbd9681db006901aecd23824122a810e437

    • Size

      286KB

    • MD5

      5cb43bf4b7e5329caa8d51f59f8774d5

    • SHA1

      5cf6138ddfba03f6922e15894f47a23e69bebc2c

    • SHA256

      267ea3542987795c6e34298e5e43efbd9681db006901aecd23824122a810e437

    • SHA512

      9858b482d9c82f50f683ec6dbb48ebb937af8cf515cf6be0b933b1873fad3708d506d421376593cbcd01e606efc61e01886c66f9dc2704d6c2d97727e0960081

    • SSDEEP

      3072:dRbZEXlwNqK5HzGyx6jZ8UA7z9YP3vYcghUg1ObLt:d1dqNT3JghS5

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Drops startup file

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Impact

Inhibit System Recovery

2
T1490

Tasks