General

  • Target

    7eb6b2a7023300666acd2778fcfb450a9fbe2572f4f5e80a665a3fb17a2c1620

  • Size

    205KB

  • Sample

    221128-gs27cabb57

  • MD5

    a68fca7118b49b5cd23a4935961db414

  • SHA1

    b012adfbb775b9bdcb97f0f6499cef78c1d164eb

  • SHA256

    7eb6b2a7023300666acd2778fcfb450a9fbe2572f4f5e80a665a3fb17a2c1620

  • SHA512

    a079dd81d95867b5850a2c2752f2bff095d07da9dd3210559f2ecfa0ff2efe60208691e19c5a3d2c0110240adde35264546367b668d196baf037604ea28b9f54

  • SSDEEP

    6144:2tDhyn6LyqfdR5SeZo7N9PmRqV4Q+zSt+:2tDdfD5SIO9PmRGww+

Malware Config

Targets

    • Target

      7eb6b2a7023300666acd2778fcfb450a9fbe2572f4f5e80a665a3fb17a2c1620

    • Size

      205KB

    • MD5

      a68fca7118b49b5cd23a4935961db414

    • SHA1

      b012adfbb775b9bdcb97f0f6499cef78c1d164eb

    • SHA256

      7eb6b2a7023300666acd2778fcfb450a9fbe2572f4f5e80a665a3fb17a2c1620

    • SHA512

      a079dd81d95867b5850a2c2752f2bff095d07da9dd3210559f2ecfa0ff2efe60208691e19c5a3d2c0110240adde35264546367b668d196baf037604ea28b9f54

    • SSDEEP

      6144:2tDhyn6LyqfdR5SeZo7N9PmRqV4Q+zSt+:2tDdfD5SIO9PmRGww+

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Impact

Inhibit System Recovery

2
T1490

Tasks