General

  • Target

    b6555a8d62f03786498e06b1f673a3350fd83e374055cd91f3d99bf5873c594b

  • Size

    129KB

  • Sample

    221128-e3j3eaef47

  • MD5

    d77fe688327ca995e2fd98e557f67772

  • SHA1

    12f451246e98e18418bbed8df55d847eb2d96222

  • SHA256

    b6555a8d62f03786498e06b1f673a3350fd83e374055cd91f3d99bf5873c594b

  • SHA512

    47ccdc9d2375c40b6714d6a0aead86c5678e5dd00c2bb1484e1d7e0786126846a743ed51182d31133e2964bebf16bfa40f312761c1cfc26160e22e27fef26aea

  • SSDEEP

    3072:B7RC+zd/EtzAAJ1rVAgCQXopj4B6SVqCgQfBUnPy8L66iiSM:B7JdEt8ATrdCQ4pj4B6SVqCgQfBUPy8S

Malware Config

Targets

    • Target

      b6555a8d62f03786498e06b1f673a3350fd83e374055cd91f3d99bf5873c594b

    • Size

      129KB

    • MD5

      d77fe688327ca995e2fd98e557f67772

    • SHA1

      12f451246e98e18418bbed8df55d847eb2d96222

    • SHA256

      b6555a8d62f03786498e06b1f673a3350fd83e374055cd91f3d99bf5873c594b

    • SHA512

      47ccdc9d2375c40b6714d6a0aead86c5678e5dd00c2bb1484e1d7e0786126846a743ed51182d31133e2964bebf16bfa40f312761c1cfc26160e22e27fef26aea

    • SSDEEP

      3072:B7RC+zd/EtzAAJ1rVAgCQXopj4B6SVqCgQfBUnPy8L66iiSM:B7JdEt8ATrdCQ4pj4B6SVqCgQfBUPy8S

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Impact

Inhibit System Recovery

2
T1490

Tasks