General

  • Target

    5a4b59886e1720839a0731967c000e239cddd5220c3a82d54e326e4b3ca78eef

  • Size

    244KB

  • Sample

    221124-jnammscf2t

  • MD5

    b725067c7926e8a3268d2fabfcad7b4e

  • SHA1

    2518fb688bec920f49e6b20144dc385866a2a70c

  • SHA256

    5a4b59886e1720839a0731967c000e239cddd5220c3a82d54e326e4b3ca78eef

  • SHA512

    41a2631b82f007cfca0e50904ff288995c202583c0da99df94cf840f5f3b8b6cb332e17cd95ce737f4379074e60250932b5c61d39cb37d829003915c538f908c

  • SSDEEP

    6144:zKsiUOlPoYuvIPXCJ7/r32Ay1BJWCTVTAmk:zx8QYuOCp2Ay/dK

Malware Config

Targets

    • Target

      5a4b59886e1720839a0731967c000e239cddd5220c3a82d54e326e4b3ca78eef

    • Size

      244KB

    • MD5

      b725067c7926e8a3268d2fabfcad7b4e

    • SHA1

      2518fb688bec920f49e6b20144dc385866a2a70c

    • SHA256

      5a4b59886e1720839a0731967c000e239cddd5220c3a82d54e326e4b3ca78eef

    • SHA512

      41a2631b82f007cfca0e50904ff288995c202583c0da99df94cf840f5f3b8b6cb332e17cd95ce737f4379074e60250932b5c61d39cb37d829003915c538f908c

    • SSDEEP

      6144:zKsiUOlPoYuvIPXCJ7/r32Ay1BJWCTVTAmk:zx8QYuOCp2Ay/dK

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Impact

Inhibit System Recovery

2
T1490

Tasks