General

  • Target

    752b6501e2db6d7f2115dfa11423fe52bfc0950932f227dee604083f9c5a5659

  • Size

    735KB

  • Sample

    221128-dksq6aee3w

  • MD5

    444db1f0fae814d3552eabb7ac59f58f

  • SHA1

    8fe95ed6462012e71229421117c3e3aedaaa58d8

  • SHA256

    752b6501e2db6d7f2115dfa11423fe52bfc0950932f227dee604083f9c5a5659

  • SHA512

    2b10b28ebad28875bfd824bc07f5d4cafd1fa040e9b8cad3a0cdef88e5c0ac7fbb9faafad678054097bd9d76ffb2c3eea69e1d0b34490f0fb67c99f65af9b67b

  • SSDEEP

    12288:Adp8fcf7cNCZmSqKd89MP79IKVLbKSctHSoHGkb9uAO7GjBEvRGGW:s86mwd8WPxbVXF2HSoHGkbxOaEgGW

Malware Config

Targets

    • Target

      752b6501e2db6d7f2115dfa11423fe52bfc0950932f227dee604083f9c5a5659

    • Size

      735KB

    • MD5

      444db1f0fae814d3552eabb7ac59f58f

    • SHA1

      8fe95ed6462012e71229421117c3e3aedaaa58d8

    • SHA256

      752b6501e2db6d7f2115dfa11423fe52bfc0950932f227dee604083f9c5a5659

    • SHA512

      2b10b28ebad28875bfd824bc07f5d4cafd1fa040e9b8cad3a0cdef88e5c0ac7fbb9faafad678054097bd9d76ffb2c3eea69e1d0b34490f0fb67c99f65af9b67b

    • SSDEEP

      12288:Adp8fcf7cNCZmSqKd89MP79IKVLbKSctHSoHGkb9uAO7GjBEvRGGW:s86mwd8WPxbVXF2HSoHGkbxOaEgGW

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks