General

  • Target

    MDE_File_Sample_84ecb958fc4bef4cbc9f4934d7069397c5b96dca.zip

  • Size

    260KB

  • Sample

    230511-kgcdbsed7z

  • MD5

    da47fd0d80c0b041160edfb2857f9cdc

  • SHA1

    a94315e48ebc84d699f234790a145f87bae86b8e

  • SHA256

    796e7fd046d193c74fb478bcd2473379b96b4dc37f85a1e9a1c6024fc0c963ef

  • SHA512

    646389b0b811c673d7c8e009b63c432a51be0897846b4017d7f0d4ec43b4e43b7e77b1a88debca9009f6546f04ecd216e28976cfb764d09e755761b799ae48e8

  • SSDEEP

    6144:GWPPl1/g+pgRHv9ZMji215RZ5zhlHHgKd5LlfgtL:jPPlJg+pVi215RDnQR

Score
10/10

Malware Config

Targets

    • Target

      Мобилизационное предписание №186-31005-23 от 10.05.2023.exe

    • Size

      437KB

    • MD5

      7143e68ee9d464446312eef1ace05482

    • SHA1

      f397d009ea6cde40dd7e3a501dd37c1547e00638

    • SHA256

      f1cc45caf2b1c60219840f6794ed2d15721cf1a86c96d1f3d4fb822d302c09fc

    • SHA512

      999496ee879121686e042153a0553edf2ac3be8acb0322a24f7e7a2cdc1558302eba61f4aa6a4208bced7c86e01cbdf050df5c4406ee45d14ed30c3845788eed

    • SSDEEP

      6144:LOYGXaPNxdgSdcq2pVZPOJHAbKjyIfd5ZbGdCmHgE5lN:fGqN/XdctpVtkz/fd5ZQgEHN

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Blocklisted process makes network request

    • Deletes itself

    • Loads dropped DLL

    • Registers COM server for autorun

MITRE ATT&CK Enterprise v6

Tasks