General

  • Target

    R5X2SH.bin

  • Size

    229KB

  • Sample

    230311-vgczzacd5v

  • MD5

    2316091f02153ac20dff768513aae1a4

  • SHA1

    6b7b1017b9313ab87fccf4ea08a427c1499b89dc

  • SHA256

    940bddbc6ef19b211f2022d61bf4d006969da11f9fe0beba98586e554dfcc741

  • SHA512

    ff039365b85686a4b191a81d3f0e3b8ced76a7b3161d28906854d86cf2452c96dd2e476ef29f3eae29ea22efce4f0d4484b82a32bfe8dde0e0fec91d630b1448

  • SSDEEP

    6144:oNxyvPouZtK58suC/004GKXkq4RUs3fY:oNxyXNtK58su3Z0RPY

Malware Config

Targets

    • Target

      R5X2SH.bin

    • Size

      229KB

    • MD5

      2316091f02153ac20dff768513aae1a4

    • SHA1

      6b7b1017b9313ab87fccf4ea08a427c1499b89dc

    • SHA256

      940bddbc6ef19b211f2022d61bf4d006969da11f9fe0beba98586e554dfcc741

    • SHA512

      ff039365b85686a4b191a81d3f0e3b8ced76a7b3161d28906854d86cf2452c96dd2e476ef29f3eae29ea22efce4f0d4484b82a32bfe8dde0e0fec91d630b1448

    • SSDEEP

      6144:oNxyvPouZtK58suC/004GKXkq4RUs3fY:oNxyXNtK58su3Z0RPY

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Modifies file permissions

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Deletion

2
T1107

File Permissions Modification

1
T1222

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Impact

Inhibit System Recovery

2
T1490

Tasks