General

  • Target

    18bd1ff24cf637c9ce36cd4e995b217a616063167355497803cca6b58eab9020

  • Size

    388KB

  • Sample

    221128-g841wacc89

  • MD5

    7616872b3a200264a8d476db29be2313

  • SHA1

    2d91b496b2b722ca990483fa9dd786c50bb20a91

  • SHA256

    18bd1ff24cf637c9ce36cd4e995b217a616063167355497803cca6b58eab9020

  • SHA512

    0a3018693edf7941b39c73f57bf6b0fc403a419a7121ecb8f0bd94be532e35f8fa2d2721c0ddb695855593125aa62f65ab1536cbb2267279c25ef8719a2530e9

  • SSDEEP

    6144:PGxKInHfsR5Qh3By8wCmLLpwFwLJ7ubiZOlZjbuueYlSD7DQB6JYDxHfs9o/Sn:OUaHK4y9jLpXLtuVlZjbUYG7DNiH8N

Malware Config

Targets

    • Target

      18bd1ff24cf637c9ce36cd4e995b217a616063167355497803cca6b58eab9020

    • Size

      388KB

    • MD5

      7616872b3a200264a8d476db29be2313

    • SHA1

      2d91b496b2b722ca990483fa9dd786c50bb20a91

    • SHA256

      18bd1ff24cf637c9ce36cd4e995b217a616063167355497803cca6b58eab9020

    • SHA512

      0a3018693edf7941b39c73f57bf6b0fc403a419a7121ecb8f0bd94be532e35f8fa2d2721c0ddb695855593125aa62f65ab1536cbb2267279c25ef8719a2530e9

    • SSDEEP

      6144:PGxKInHfsR5Qh3By8wCmLLpwFwLJ7ubiZOlZjbuueYlSD7DQB6JYDxHfs9o/Sn:OUaHK4y9jLpXLtuVlZjbUYG7DNiH8N

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks