General

  • Target

    b403af902f115127cd9484244917b431ec9fd746feda7fb31e2724ff201e985d

  • Size

    218KB

  • Sample

    221128-d8dl5sgb8y

  • MD5

    bcafd7b7645e9934302fb83785a711ec

  • SHA1

    27eff28b3838667f402bbb31708cfb37b2ecc483

  • SHA256

    b403af902f115127cd9484244917b431ec9fd746feda7fb31e2724ff201e985d

  • SHA512

    701fc5915ad5977f725c16ebff4b831879e90df587ef2a5ee8b1e9711efdcb6a43011c95e3abd2f3c146b528e3504925940c883f327f7dab75784f0f3382f2c6

  • SSDEEP

    6144:c8dNXSEqoFkV4UDr/l6lcb8uGtIC16m+9J:HqYkdr8SZw6R9J

Malware Config

Targets

    • Target

      b403af902f115127cd9484244917b431ec9fd746feda7fb31e2724ff201e985d

    • Size

      218KB

    • MD5

      bcafd7b7645e9934302fb83785a711ec

    • SHA1

      27eff28b3838667f402bbb31708cfb37b2ecc483

    • SHA256

      b403af902f115127cd9484244917b431ec9fd746feda7fb31e2724ff201e985d

    • SHA512

      701fc5915ad5977f725c16ebff4b831879e90df587ef2a5ee8b1e9711efdcb6a43011c95e3abd2f3c146b528e3504925940c883f327f7dab75784f0f3382f2c6

    • SSDEEP

      6144:c8dNXSEqoFkV4UDr/l6lcb8uGtIC16m+9J:HqYkdr8SZw6R9J

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Discovery

System Information Discovery

2
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks