General

  • Target

    222fd3efb402cd02bd7e63295e7f9f63e351b2329b040f2f20e505ea6e9c7bad

  • Size

    462KB

  • Sample

    221128-cpqa6agb76

  • MD5

    8b638a770dda18903114ebe39badcd98

  • SHA1

    30f45f51316e8529148c3d80656da026b8306485

  • SHA256

    222fd3efb402cd02bd7e63295e7f9f63e351b2329b040f2f20e505ea6e9c7bad

  • SHA512

    e0a7a25ce7fddeba6ed07f09c5b13c5a78b6c483d775e0e4237b469a6e4c9e0c653364178637dbaa63942b95c11b22ee253b8d86fb2fcef33a7a9e62c2eac0b9

  • SSDEEP

    6144:pi4LrqCFyLEYK2P1VanQ2caCjJXF/j/IMGK/EeD71wlTZF5558cF0I:pLvvIL1CCFXF/P7j7aTDDqcFX

Malware Config

Targets

    • Target

      222fd3efb402cd02bd7e63295e7f9f63e351b2329b040f2f20e505ea6e9c7bad

    • Size

      462KB

    • MD5

      8b638a770dda18903114ebe39badcd98

    • SHA1

      30f45f51316e8529148c3d80656da026b8306485

    • SHA256

      222fd3efb402cd02bd7e63295e7f9f63e351b2329b040f2f20e505ea6e9c7bad

    • SHA512

      e0a7a25ce7fddeba6ed07f09c5b13c5a78b6c483d775e0e4237b469a6e4c9e0c653364178637dbaa63942b95c11b22ee253b8d86fb2fcef33a7a9e62c2eac0b9

    • SSDEEP

      6144:pi4LrqCFyLEYK2P1VanQ2caCjJXF/j/IMGK/EeD71wlTZF5558cF0I:pLvvIL1CCFXF/P7j7aTDDqcFX

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks