General

  • Target

    b76c07f9a07db7fb8bf83464890d6981ff7ba6bbb51cafb725d37f5be2e1d543

  • Size

    552KB

  • Sample

    221125-3ht9mseg38

  • MD5

    67a532c43f067779df6eac4ae0acc07c

  • SHA1

    cbf2efd61bebfa08613cf66a66b87e0a8a259af8

  • SHA256

    b76c07f9a07db7fb8bf83464890d6981ff7ba6bbb51cafb725d37f5be2e1d543

  • SHA512

    f5e80473ad2747f596ee48d56f167ab58964249fffadb2dec1119ff4f4b200a6115845f3d8702dfff3a0ef57a33428bd41afd57d8cecd6e509b8cebc22cc749a

  • SSDEEP

    6144:vUZjWquq3bBE4oKTKFvhAp080KqKoePisPa2hHoFXl5iwtWTFM2qWqWMBugSl3NP:8ZjLucE4/KR7KqKoe6sPJhIFW9TZP9h

Malware Config

Targets

    • Target

      b76c07f9a07db7fb8bf83464890d6981ff7ba6bbb51cafb725d37f5be2e1d543

    • Size

      552KB

    • MD5

      67a532c43f067779df6eac4ae0acc07c

    • SHA1

      cbf2efd61bebfa08613cf66a66b87e0a8a259af8

    • SHA256

      b76c07f9a07db7fb8bf83464890d6981ff7ba6bbb51cafb725d37f5be2e1d543

    • SHA512

      f5e80473ad2747f596ee48d56f167ab58964249fffadb2dec1119ff4f4b200a6115845f3d8702dfff3a0ef57a33428bd41afd57d8cecd6e509b8cebc22cc749a

    • SSDEEP

      6144:vUZjWquq3bBE4oKTKFvhAp080KqKoePisPa2hHoFXl5iwtWTFM2qWqWMBugSl3NP:8ZjLucE4/KR7KqKoe6sPJhIFW9TZP9h

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks