General

  • Target

    3b84ede7ebb5ee92eb35516bd5f5d879a87ff683d1cd5e9f4b5f544ceb69a510

  • Size

    233KB

  • Sample

    221128-d8cd3sgb8x

  • MD5

    c2efdab47b2d73830a22c9ac0b657312

  • SHA1

    f2a4a936724801711b53ff762a56e224ea27fd30

  • SHA256

    3b84ede7ebb5ee92eb35516bd5f5d879a87ff683d1cd5e9f4b5f544ceb69a510

  • SHA512

    3ada1a8e690e434a16946ce9db8fc5208f9953aeeb07096e3f63b3279ae2b86d4efbfda10f5534d734379cb2676e0a9c780381f1ae5ff53c61626c5787352831

  • SSDEEP

    6144:88dNXSEpKv7eR9aG9S/W8h2srCg8EMeFSjsJuEi+w8WlCc2Oz2Yxl:npKvK7r9S/PfCaMdlJ8WQO1l

Malware Config

Targets

    • Target

      3b84ede7ebb5ee92eb35516bd5f5d879a87ff683d1cd5e9f4b5f544ceb69a510

    • Size

      233KB

    • MD5

      c2efdab47b2d73830a22c9ac0b657312

    • SHA1

      f2a4a936724801711b53ff762a56e224ea27fd30

    • SHA256

      3b84ede7ebb5ee92eb35516bd5f5d879a87ff683d1cd5e9f4b5f544ceb69a510

    • SHA512

      3ada1a8e690e434a16946ce9db8fc5208f9953aeeb07096e3f63b3279ae2b86d4efbfda10f5534d734379cb2676e0a9c780381f1ae5ff53c61626c5787352831

    • SSDEEP

      6144:88dNXSEpKv7eR9aG9S/W8h2srCg8EMeFSjsJuEi+w8WlCc2Oz2Yxl:npKvK7r9S/PfCaMdlJ8WQO1l

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Discovery

System Information Discovery

2
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks