General

  • Target

    3a738402946b1c5810e2d3e6bd02eb440a17930a3123740fb48a1e21b4064cb0

  • Size

    232KB

  • Sample

    221128-sdp41sca43

  • MD5

    80a735b520d4f75a4cb7ac829de99ab4

  • SHA1

    e7a0e483d97424c6cf75d402325cd31eef730bfa

  • SHA256

    3a738402946b1c5810e2d3e6bd02eb440a17930a3123740fb48a1e21b4064cb0

  • SHA512

    b670bff8a2905d5914282af76b3cefb8216085420cd8141f923487eda54376640adde2c9137c8daffaec88c4ee43e7d90fa2842c0b404c0ae2ed0d457cc8eed8

  • SSDEEP

    6144:yAsBZ1Z69879Fm9PmqZIccYyhbPaHVzc+A:aZ6O79aJuPOa+A

Malware Config

Targets

    • Target

      3a738402946b1c5810e2d3e6bd02eb440a17930a3123740fb48a1e21b4064cb0

    • Size

      232KB

    • MD5

      80a735b520d4f75a4cb7ac829de99ab4

    • SHA1

      e7a0e483d97424c6cf75d402325cd31eef730bfa

    • SHA256

      3a738402946b1c5810e2d3e6bd02eb440a17930a3123740fb48a1e21b4064cb0

    • SHA512

      b670bff8a2905d5914282af76b3cefb8216085420cd8141f923487eda54376640adde2c9137c8daffaec88c4ee43e7d90fa2842c0b404c0ae2ed0d457cc8eed8

    • SSDEEP

      6144:yAsBZ1Z69879Fm9PmqZIccYyhbPaHVzc+A:aZ6O79aJuPOa+A

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

Modify Registry

2
T1112

Discovery

System Information Discovery

2
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks