General

  • Target

    581d8d2020c544f1643db5a65d33df332ad5c174a3e8ce1acb89a799d93712df

  • Size

    295KB

  • Sample

    221124-pm5dhsgd9v

  • MD5

    9e5876251361b4dbac5bc7e9eb252556

  • SHA1

    e93b59baca4b50ad3506560e002a9c591b7aa1af

  • SHA256

    581d8d2020c544f1643db5a65d33df332ad5c174a3e8ce1acb89a799d93712df

  • SHA512

    6fbedc743fcbad1c67def96f3956361eaa954a4364cb2d12d2138cfafa54e7675d40e7d930e3075730523a5ec260de249d398a549c815622248c8c76d76914ce

  • SSDEEP

    6144:VtMsLvfku4J/5S71EMjCa/9zq0+pBQphUl6Z/MADK8:VtB3TZOalzq0+jQjUCEADd

Malware Config

Targets

    • Target

      Info.Pdf____________________________________________________________.exe

    • Size

      494KB

    • MD5

      cb607388d6b05dcf0d77fd06f563511d

    • SHA1

      85717a638f5a3cc62b2f5e25897fcee997f35070

    • SHA256

      8a375f861957b7effcda03ba43720d5bc14eeea97a33475a78b904714283d04e

    • SHA512

      3bc8cd97bad6c38711eb67ff88b7cc158d991677a0a07d3efb73837d43eaa7bdbd7fb96d2f5a225f5a4fc39cc1aa2a2c6cd4091d201da79cb7be98fd459c246a

    • SSDEEP

      6144:+7imLFJzjEIl1qcQL7twzWuWFyvgI/EhlRlI8tEUauf+zT3:6RljEIXZ6uaUgF3RllT+zT3

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Collection

Email Collection

2
T1114

Impact

Inhibit System Recovery

2
T1490

Tasks