General

  • Target

    40b3cb2a210fafdaabdebefe1430862bd1192a80fcde84f51ceb387136d1410c

  • Size

    268KB

  • Sample

    221127-tpzchaah79

  • MD5

    12666b5054cc0cb62cf758736340c1bc

  • SHA1

    0f9ec608413918adef409e8e97612b6e71fd1bc7

  • SHA256

    40b3cb2a210fafdaabdebefe1430862bd1192a80fcde84f51ceb387136d1410c

  • SHA512

    df49dbcd1f2f0bf0d0129cb4e5dd343fc9fba1b46a7fc24db3e1fd560816ae86e79c360873ac06c62876051f622a9a54a327c3aa3019ecdad4a32f9dc9a68a77

  • SSDEEP

    6144:1AZMCVtysJu4wCZt953XCWSntmb6IEACyoO+:u2wXCBWLEA5n+

Malware Config

Targets

    • Target

      40b3cb2a210fafdaabdebefe1430862bd1192a80fcde84f51ceb387136d1410c

    • Size

      268KB

    • MD5

      12666b5054cc0cb62cf758736340c1bc

    • SHA1

      0f9ec608413918adef409e8e97612b6e71fd1bc7

    • SHA256

      40b3cb2a210fafdaabdebefe1430862bd1192a80fcde84f51ceb387136d1410c

    • SHA512

      df49dbcd1f2f0bf0d0129cb4e5dd343fc9fba1b46a7fc24db3e1fd560816ae86e79c360873ac06c62876051f622a9a54a327c3aa3019ecdad4a32f9dc9a68a77

    • SSDEEP

      6144:1AZMCVtysJu4wCZt953XCWSntmb6IEACyoO+:u2wXCBWLEA5n+

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks