General

  • Target

    ec07de066b60552dcd3a9abfab35d3afb300122fb346750aba618dab059bfa23

  • Size

    253KB

  • Sample

    221128-jwyz7sge42

  • MD5

    ca52ca2061304bcb88c932b1b28c0332

  • SHA1

    93f3261590daf4b8d588cba095d55045820d1414

  • SHA256

    ec07de066b60552dcd3a9abfab35d3afb300122fb346750aba618dab059bfa23

  • SHA512

    3f1395e13567f25ecc60913a4e5ab459c39e8ce9cc2122e66cc1ce646b4197cd5e6f1049a78cdc1488bd3808f018f3c42c16175c5554e046b703a1ead8cab750

  • SSDEEP

    6144:oFiLGLdtaJip+TI5FQZwgpR+tEJjJ/yDb4QmfKMLj2Y:DLGBtaJlc5RgitE51yf4QmfKQ

Malware Config

Targets

    • Target

      MensajePdf_____________________________________________________________.exe

    • Size

      313KB

    • MD5

      97b0a298b70cbb33056e43cd3360a096

    • SHA1

      a6ccdae016b8330c0ff44a694b44108f37eea595

    • SHA256

      78167371bd593b20a32902f0e3182d892b047521a1185904305671b6bafd51ab

    • SHA512

      89c7e317b11579e636aa07b3e50d110ec23f0d5e10fedf90543f1d9ca291871ea7337c7adfeef49377eaaa7ec607f05103ee339495a39a49533fbee2014f4f1a

    • SSDEEP

      6144:l24g1A0OvpVXJ8Q0T2c/H+csQMxnw9OoteG7qIEjp/4UQ1Ms:84g1A0OvDJI2c3sQNIotjup91

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks