General

  • Target

    e7b79b2c2e1f7db30190f58f27f02afb6f042b13f0100db282b6249d2a08cbd4

  • Size

    230KB

  • Sample

    221128-d8c1lscb85

  • MD5

    0a8d712effd073e94ea693e87ab4c0e1

  • SHA1

    d196aa6bd299c35ab506b2fd54ea614c36d1a77e

  • SHA256

    e7b79b2c2e1f7db30190f58f27f02afb6f042b13f0100db282b6249d2a08cbd4

  • SHA512

    f2d1585d53fce1783cecdc27633850fcfd06ca2daad6e30da45f28d02db78c6c09eb496263a35820bf8f26d2709d8761fbb8143c69d7ccaee8e2a35140b9e10b

  • SSDEEP

    6144:88dNXSEpr69Th3UuMLytcUK36KNgPgDdAm692CM8/N:npOh3UuCytcUsqg5p69e8/N

Malware Config

Targets

    • Target

      e7b79b2c2e1f7db30190f58f27f02afb6f042b13f0100db282b6249d2a08cbd4

    • Size

      230KB

    • MD5

      0a8d712effd073e94ea693e87ab4c0e1

    • SHA1

      d196aa6bd299c35ab506b2fd54ea614c36d1a77e

    • SHA256

      e7b79b2c2e1f7db30190f58f27f02afb6f042b13f0100db282b6249d2a08cbd4

    • SHA512

      f2d1585d53fce1783cecdc27633850fcfd06ca2daad6e30da45f28d02db78c6c09eb496263a35820bf8f26d2709d8761fbb8143c69d7ccaee8e2a35140b9e10b

    • SSDEEP

      6144:88dNXSEpr69Th3UuMLytcUK36KNgPgDdAm692CM8/N:npOh3UuCytcUsqg5p69e8/N

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Discovery

System Information Discovery

4
T1082

Query Registry

2
T1012

Impact

Inhibit System Recovery

2
T1490

Tasks