General

  • Target

    8afc51fb904b25124bd5cb41985e917333071d1af1c6ab83cc7ae408e7cb0e7e

  • Size

    765KB

  • Sample

    221128-e2vgraaf4s

  • MD5

    54a6d762039fd77d11669ca5ee10f56f

  • SHA1

    3f2b17cbe9a5291d8f14f9359113bf7f59ea13ba

  • SHA256

    8afc51fb904b25124bd5cb41985e917333071d1af1c6ab83cc7ae408e7cb0e7e

  • SHA512

    44fe379e68cdbac584d33589859ca65791640e1a013dbc92bb770ede63f95841ddb2e76f7616f2736417c8b8ad040ce3cebbd669882a7e88a1e1c09d65f789de

  • SSDEEP

    12288:oV+pDu9YrDQKiXEfiVzhY1Iys0P9ck4gete0bKSctHSoHvVn6eVijzFME4fmUReH:oI0sDNiUfiPgI91k4geY2F2HSoHvB6cs

Malware Config

Targets

    • Target

      8afc51fb904b25124bd5cb41985e917333071d1af1c6ab83cc7ae408e7cb0e7e

    • Size

      765KB

    • MD5

      54a6d762039fd77d11669ca5ee10f56f

    • SHA1

      3f2b17cbe9a5291d8f14f9359113bf7f59ea13ba

    • SHA256

      8afc51fb904b25124bd5cb41985e917333071d1af1c6ab83cc7ae408e7cb0e7e

    • SHA512

      44fe379e68cdbac584d33589859ca65791640e1a013dbc92bb770ede63f95841ddb2e76f7616f2736417c8b8ad040ce3cebbd669882a7e88a1e1c09d65f789de

    • SSDEEP

      12288:oV+pDu9YrDQKiXEfiVzhY1Iys0P9ck4gete0bKSctHSoHvVn6eVijzFME4fmUReH:oI0sDNiUfiPgI91k4geY2F2HSoHvB6cs

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks