General

  • Target

    42a80743b3a3950c0c5134d7820b8327ef32bb29f721a9f9e3204aab48b79e30

  • Size

    300KB

  • Sample

    221127-h4vgbahc87

  • MD5

    6d316c32ccb411b0c2e5d5c595f228ac

  • SHA1

    528363b59474d6bc98af1c6047127293c000495f

  • SHA256

    42a80743b3a3950c0c5134d7820b8327ef32bb29f721a9f9e3204aab48b79e30

  • SHA512

    088927806d14ef2e8b3e81fb45eb6e75f4b9853142a71baa5beae83952d92118e9a0d253086cc8283fcd3d2ed7ec84653a4bfe8bbbdc2d97af0207d6a33b9c3e

  • SSDEEP

    3072:y2RN5GMOtUVOQ24iaw4CsaT1M4NFNbL+XclX8m2RbAvW6IeX7Hishb2cM7IjTbJe:jRNaUUQK4CblNWXkKkBrSyFJC

Malware Config

Targets

    • Target

      42a80743b3a3950c0c5134d7820b8327ef32bb29f721a9f9e3204aab48b79e30

    • Size

      300KB

    • MD5

      6d316c32ccb411b0c2e5d5c595f228ac

    • SHA1

      528363b59474d6bc98af1c6047127293c000495f

    • SHA256

      42a80743b3a3950c0c5134d7820b8327ef32bb29f721a9f9e3204aab48b79e30

    • SHA512

      088927806d14ef2e8b3e81fb45eb6e75f4b9853142a71baa5beae83952d92118e9a0d253086cc8283fcd3d2ed7ec84653a4bfe8bbbdc2d97af0207d6a33b9c3e

    • SSDEEP

      3072:y2RN5GMOtUVOQ24iaw4CsaT1M4NFNbL+XclX8m2RbAvW6IeX7Hishb2cM7IjTbJe:jRNaUUQK4CblNWXkKkBrSyFJC

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks