General

  • Target

    8aae7f0575d68d4070b66bb528c3e4f4270a09156c00989fe25609c7b519a76d

  • Size

    352KB

  • Sample

    221128-e3c9vsaf7t

  • MD5

    b4de54b35be567dccdb82bdd68ee2e65

  • SHA1

    2bd1c9fa438584b9305cd08f7b81c3b02eb9bfdc

  • SHA256

    8aae7f0575d68d4070b66bb528c3e4f4270a09156c00989fe25609c7b519a76d

  • SHA512

    8d5a2128d10061572550ca3af95e04af04b3149af64306aa2044c23772651054e010ad9a3b6ffc6103bcde5c934abb00f81f74dc819292be888652f41da1124c

  • SSDEEP

    6144:Ii7FhAd2I4+zdGDSkKstgehkB2bNlHRQp1SKjrU8C:nFmdH4adGDSkl9/87

Malware Config

Targets

    • Target

      8aae7f0575d68d4070b66bb528c3e4f4270a09156c00989fe25609c7b519a76d

    • Size

      352KB

    • MD5

      b4de54b35be567dccdb82bdd68ee2e65

    • SHA1

      2bd1c9fa438584b9305cd08f7b81c3b02eb9bfdc

    • SHA256

      8aae7f0575d68d4070b66bb528c3e4f4270a09156c00989fe25609c7b519a76d

    • SHA512

      8d5a2128d10061572550ca3af95e04af04b3149af64306aa2044c23772651054e010ad9a3b6ffc6103bcde5c934abb00f81f74dc819292be888652f41da1124c

    • SSDEEP

      6144:Ii7FhAd2I4+zdGDSkKstgehkB2bNlHRQp1SKjrU8C:nFmdH4adGDSkl9/87

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Impact

Inhibit System Recovery

2
T1490

Tasks