General

  • Target

    d4d36ea03fb4b3e1b33069073a8bf2c0f63a681ba51173f5d349e8f1356caf21

  • Size

    149KB

  • Sample

    221128-ge297aec8z

  • MD5

    1e4e9740b6dfd25244f39aa4bd5321c9

  • SHA1

    19e7e9d26a12a3441ed44e32d7985e829a9acdbc

  • SHA256

    d4d36ea03fb4b3e1b33069073a8bf2c0f63a681ba51173f5d349e8f1356caf21

  • SHA512

    8f358cce4cb7e38e64f4a5c8e9f3bd120ff1c919452d15816edca7d872131db1842f132e5a7f45e56ff4e1887a694a073cc9f5708722d423f18728500123cfb0

  • SSDEEP

    3072:vgZsYK3V6qRbShJvB12wtfkcRPIuxvvliXXDB3QnEN0BdYZp:3V6UmJ4rLG1uXV3QnEN0BG

Malware Config

Targets

    • Target

      d4d36ea03fb4b3e1b33069073a8bf2c0f63a681ba51173f5d349e8f1356caf21

    • Size

      149KB

    • MD5

      1e4e9740b6dfd25244f39aa4bd5321c9

    • SHA1

      19e7e9d26a12a3441ed44e32d7985e829a9acdbc

    • SHA256

      d4d36ea03fb4b3e1b33069073a8bf2c0f63a681ba51173f5d349e8f1356caf21

    • SHA512

      8f358cce4cb7e38e64f4a5c8e9f3bd120ff1c919452d15816edca7d872131db1842f132e5a7f45e56ff4e1887a694a073cc9f5708722d423f18728500123cfb0

    • SSDEEP

      3072:vgZsYK3V6qRbShJvB12wtfkcRPIuxvvliXXDB3QnEN0BdYZp:3V6UmJ4rLG1uXV3QnEN0BG

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Impact

Inhibit System Recovery

2
T1490

Tasks