General

  • Target

    52a6d5e35047fa5c952bad7469706ef0f0dff4658abe73eb5563eb704ce8568e

  • Size

    740KB

  • Sample

    221128-d253taff7z

  • MD5

    0df48f8ca20443a9f260def3c32b9770

  • SHA1

    81193d5873c7b291b7c0e24c459c40fd648ed68a

  • SHA256

    52a6d5e35047fa5c952bad7469706ef0f0dff4658abe73eb5563eb704ce8568e

  • SHA512

    b7e898ccd5cf3a8549a3e5aabbc53117174ea50f3c1d878bacb610f101b76fdca39b51e370600ee8e14379aef98415719d5af4164ef9b18afff7a1684adb85a4

  • SSDEEP

    12288:iep8fcP7cG9CZmSqKd89MP70IKViOvYeHSo+6XWnEzUYjD9a:H8qbfwd8WP4bVLvHHSo+IWk1a

Malware Config

Targets

    • Target

      52a6d5e35047fa5c952bad7469706ef0f0dff4658abe73eb5563eb704ce8568e

    • Size

      740KB

    • MD5

      0df48f8ca20443a9f260def3c32b9770

    • SHA1

      81193d5873c7b291b7c0e24c459c40fd648ed68a

    • SHA256

      52a6d5e35047fa5c952bad7469706ef0f0dff4658abe73eb5563eb704ce8568e

    • SHA512

      b7e898ccd5cf3a8549a3e5aabbc53117174ea50f3c1d878bacb610f101b76fdca39b51e370600ee8e14379aef98415719d5af4164ef9b18afff7a1684adb85a4

    • SSDEEP

      12288:iep8fcP7cG9CZmSqKd89MP70IKViOvYeHSo+6XWnEzUYjD9a:H8qbfwd8WP4bVLvHHSo+IWk1a

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks