General

  • Target

    48e92e0a73d05721e7e50a28df98ea879246970c1c0c5cdd66b635485ef3dfcb

  • Size

    469KB

  • Sample

    221124-k4gxbsdc25

  • MD5

    4a4baf09600a0da0e803d4f7716642a3

  • SHA1

    7c84b6cd0a2f50f74522fbcced39d5e85ab45389

  • SHA256

    48e92e0a73d05721e7e50a28df98ea879246970c1c0c5cdd66b635485ef3dfcb

  • SHA512

    f4c78f68df0d0160b0312fa787414c49f30b91c9fae21114ecf04725203949249226c3f4b49df8e35ddef5aed9bdb69f60d7b712516b0f0424d354c3c8c8cdb9

  • SSDEEP

    6144:kicL4qsxpzEHqcQLwIpVsBNzrn2xxHIFRU0POzzqexpKkpsszhNoFji5NDdvFZV:knUZbzS15NXn2xCH92GuzPpvFT

Malware Config

Targets

    • Target

      48e92e0a73d05721e7e50a28df98ea879246970c1c0c5cdd66b635485ef3dfcb

    • Size

      469KB

    • MD5

      4a4baf09600a0da0e803d4f7716642a3

    • SHA1

      7c84b6cd0a2f50f74522fbcced39d5e85ab45389

    • SHA256

      48e92e0a73d05721e7e50a28df98ea879246970c1c0c5cdd66b635485ef3dfcb

    • SHA512

      f4c78f68df0d0160b0312fa787414c49f30b91c9fae21114ecf04725203949249226c3f4b49df8e35ddef5aed9bdb69f60d7b712516b0f0424d354c3c8c8cdb9

    • SSDEEP

      6144:kicL4qsxpzEHqcQLwIpVsBNzrn2xxHIFRU0POzzqexpKkpsszhNoFji5NDdvFZV:knUZbzS15NXn2xCH92GuzPpvFT

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks