General

  • Target

    d7925794275a68bbba4f96a3f2926617acf1fd2d7618a1aa9ba85b20f2bc966e

  • Size

    250KB

  • Sample

    221124-el6j3sbb4w

  • MD5

    43181db08c760eaa76868440601af131

  • SHA1

    1c5f87099d56cb8f38f3d873c243df36e8530335

  • SHA256

    d7925794275a68bbba4f96a3f2926617acf1fd2d7618a1aa9ba85b20f2bc966e

  • SHA512

    358436762ec08f45413dea84f3af7a2e3d0347646355b67532273cbd8aec8d7046567ac57097b7b09d224831a1581c751d1f17673852fe2d774e48328f879ea3

  • SSDEEP

    6144:0APTqIFSlHhZkttpI16MuSisYwNKQ9PRKenTad2BofPJLL:0APOI03qzsQenWqMx

Malware Config

Targets

    • Target

      Informe.Pdf _____________________________________________________________.exe

    • Size

      531KB

    • MD5

      400d4d727950f4d6de451115b8c4cfc1

    • SHA1

      e97b06dc654b70c6c117e7b2e91c9916a06e85a4

    • SHA256

      ee177b068a2ac964536637fe4f04ff2deed524e981e69f5cceb2e0dd935c3f65

    • SHA512

      0d2d90ed3bef2f321629e63e672855ab9d4c3015970b35990147bdc14c87e657ca6c4178402f77f6e0d35ef82ce338c499b634faf928590d4717ef28d535d281

    • SSDEEP

      6144:LUv7JBskamattpI16Mu4isYwNMQ9PRKeIXIRTjv1ECkrQUK:AvqNsieIk3v1eUf

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks