General

  • Target

    bb2cbfe187efe5516dcdc42472079d25b2c7be462802df209aa6386269d5afc9

  • Size

    224KB

  • Sample

    221125-z21zraad2t

  • MD5

    5f3e8e6891e96477d4d9cba602e86966

  • SHA1

    043f7cd8a45497eb4058f2a9a7ac56b396674b21

  • SHA256

    bb2cbfe187efe5516dcdc42472079d25b2c7be462802df209aa6386269d5afc9

  • SHA512

    5469d4d4869d9767f931ca87d9a1b936c98251b234a77d2b1f57e037276398b54b7b36fe33ca23c4c4dd18440cfc8539e016feb9a70063d163916225bf0a4891

  • SSDEEP

    6144:2Cha39c49QSKTG9491OcrRF2zV2qV4hGm4V:2EK9ccfeG94i08zVl4w5

Malware Config

Targets

    • Target

      bb2cbfe187efe5516dcdc42472079d25b2c7be462802df209aa6386269d5afc9

    • Size

      224KB

    • MD5

      5f3e8e6891e96477d4d9cba602e86966

    • SHA1

      043f7cd8a45497eb4058f2a9a7ac56b396674b21

    • SHA256

      bb2cbfe187efe5516dcdc42472079d25b2c7be462802df209aa6386269d5afc9

    • SHA512

      5469d4d4869d9767f931ca87d9a1b936c98251b234a77d2b1f57e037276398b54b7b36fe33ca23c4c4dd18440cfc8539e016feb9a70063d163916225bf0a4891

    • SSDEEP

      6144:2Cha39c49QSKTG9491OcrRF2zV2qV4hGm4V:2EK9ccfeG94i08zVl4w5

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Impact

Inhibit System Recovery

2
T1490

Tasks