General

  • Target

    7db66ad64a23f53952dcd72eb1eaef6c063fb79c59db7f096930ea9285838f72

  • Size

    184KB

  • Sample

    221128-gtcyvabb78

  • MD5

    89f059a012a6911765ceaf4e3eefd2f8

  • SHA1

    d0aae8d39b153584b3ea8f82b1ccf99ebef6a20c

  • SHA256

    7db66ad64a23f53952dcd72eb1eaef6c063fb79c59db7f096930ea9285838f72

  • SHA512

    01938da98ff0352db5e8db56ad60158dfd758bba1036cbf31d6e95003254ab8bc5e8abdde6f6850258738099e6468c6fe228e0c32dd73a75a41d3161af468996

  • SSDEEP

    3072:kyXt9mTrJfPB6y0TwqjoL0sMjHicmDJij4X0PQgyrkEp92QObfOCLn2O:p4FfZ6zTwhmjsO4XcQ1F9pObp2O

Malware Config

Targets

    • Target

      7db66ad64a23f53952dcd72eb1eaef6c063fb79c59db7f096930ea9285838f72

    • Size

      184KB

    • MD5

      89f059a012a6911765ceaf4e3eefd2f8

    • SHA1

      d0aae8d39b153584b3ea8f82b1ccf99ebef6a20c

    • SHA256

      7db66ad64a23f53952dcd72eb1eaef6c063fb79c59db7f096930ea9285838f72

    • SHA512

      01938da98ff0352db5e8db56ad60158dfd758bba1036cbf31d6e95003254ab8bc5e8abdde6f6850258738099e6468c6fe228e0c32dd73a75a41d3161af468996

    • SSDEEP

      3072:kyXt9mTrJfPB6y0TwqjoL0sMjHicmDJij4X0PQgyrkEp92QObfOCLn2O:p4FfZ6zTwhmjsO4XcQ1F9pObp2O

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

3
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

2
T1490

Defacement

1
T1491

Tasks