General

  • Target

    d8792a203a660226a87b2991593cdc2ba8499ba5e54f4db34661b9cb956b03d9

  • Size

    250KB

  • Sample

    221124-el5b1sbb31

  • MD5

    22209bcc78205925d5298fa7af057a59

  • SHA1

    9476afa8c4adee01692e55a6fb2536ca71cdba4a

  • SHA256

    d8792a203a660226a87b2991593cdc2ba8499ba5e54f4db34661b9cb956b03d9

  • SHA512

    54c67e5d0fe226a076822d4e27f85648215f729636e536905d2321a8032c4f36989cae706472d19e8fc284082da84d062bff2ab0e7777ada9dabbf8ab4cc6183

  • SSDEEP

    6144:wAPTqIFSlHhZkttpI16MuSisYwNKQ9PRKenTad2BofPJLP:wAPOI03qzsQenWqMl

Malware Config

Targets

    • Target

      Responder.Pdf _____________________________________________________________.exe

    • Size

      531KB

    • MD5

      400d4d727950f4d6de451115b8c4cfc1

    • SHA1

      e97b06dc654b70c6c117e7b2e91c9916a06e85a4

    • SHA256

      ee177b068a2ac964536637fe4f04ff2deed524e981e69f5cceb2e0dd935c3f65

    • SHA512

      0d2d90ed3bef2f321629e63e672855ab9d4c3015970b35990147bdc14c87e657ca6c4178402f77f6e0d35ef82ce338c499b634faf928590d4717ef28d535d281

    • SSDEEP

      6144:LUv7JBskamattpI16Mu4isYwNMQ9PRKeIXIRTjv1ECkrQUK:AvqNsieIk3v1eUf

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks