General

  • Target

    913586e7a5c48dd71a193f3a25c36886b3a8e61bf1ec27ea1ccc0282f50df043

  • Size

    1.0MB

  • Sample

    221128-b2rjbaad7t

  • MD5

    dfb4b1532bee1ecb3f0862f733711210

  • SHA1

    8580a087477d46045af318e609abcd5dd0f87053

  • SHA256

    913586e7a5c48dd71a193f3a25c36886b3a8e61bf1ec27ea1ccc0282f50df043

  • SHA512

    66f830266990d01756ee0569e905dd7f4323ec757d900993146e7a6abdef54e253d0753aa2083062a4027f1cb2d53890e046dbf6a689fe3636fba2106822b989

  • SSDEEP

    24576:v5ARgOEDvJxoJCOKai9AGBtZFR9pVhvJ14qgFWZS/M3vLwkXRKA/tlHMK+qKoeJW:CEDDoJCOKaiaGBtZFR9pVhvJ14qgFWZV

Malware Config

Targets

    • Target

      913586e7a5c48dd71a193f3a25c36886b3a8e61bf1ec27ea1ccc0282f50df043

    • Size

      1.0MB

    • MD5

      dfb4b1532bee1ecb3f0862f733711210

    • SHA1

      8580a087477d46045af318e609abcd5dd0f87053

    • SHA256

      913586e7a5c48dd71a193f3a25c36886b3a8e61bf1ec27ea1ccc0282f50df043

    • SHA512

      66f830266990d01756ee0569e905dd7f4323ec757d900993146e7a6abdef54e253d0753aa2083062a4027f1cb2d53890e046dbf6a689fe3636fba2106822b989

    • SSDEEP

      24576:v5ARgOEDvJxoJCOKai9AGBtZFR9pVhvJ14qgFWZS/M3vLwkXRKA/tlHMK+qKoeJW:CEDDoJCOKaiaGBtZFR9pVhvJ14qgFWZV

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks