General

  • Target

    4b20937d2f09872bdb78359d0df30b554d514c7f2df07c4026f99c859b09d1f1

  • Size

    766KB

  • Sample

    221128-e2zfpsee88

  • MD5

    9b1da810487cdcb458d46f394f561fdb

  • SHA1

    b8fbf9babf7182cf7dd1e6039e4c2a072a4df70c

  • SHA256

    4b20937d2f09872bdb78359d0df30b554d514c7f2df07c4026f99c859b09d1f1

  • SHA512

    babbecf43d00e1cfe58b9b3d2895993624e62f136178f64616f43e49c1006dc9d64d6e2dcfa3b88434ad9b9790270aa063236deaaf92022d8b3ebeaa42efd7fc

  • SSDEEP

    12288:CH+pDu9YrDQKiXEfiVzhY1Iys0P9ckgveteiZLnfHSoGKmeVd8kyBwvBH4JVJ:Ce0sDNiUfiPgI91kgveYAHSoGoWeOVJ

Malware Config

Targets

    • Target

      4b20937d2f09872bdb78359d0df30b554d514c7f2df07c4026f99c859b09d1f1

    • Size

      766KB

    • MD5

      9b1da810487cdcb458d46f394f561fdb

    • SHA1

      b8fbf9babf7182cf7dd1e6039e4c2a072a4df70c

    • SHA256

      4b20937d2f09872bdb78359d0df30b554d514c7f2df07c4026f99c859b09d1f1

    • SHA512

      babbecf43d00e1cfe58b9b3d2895993624e62f136178f64616f43e49c1006dc9d64d6e2dcfa3b88434ad9b9790270aa063236deaaf92022d8b3ebeaa42efd7fc

    • SSDEEP

      12288:CH+pDu9YrDQKiXEfiVzhY1Iys0P9ckgveteiZLnfHSoGKmeVd8kyBwvBH4JVJ:Ce0sDNiUfiPgI91kgveYAHSoGoWeOVJ

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks