General

  • Target

    3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370

  • Size

    284KB

  • Sample

    230514-2awbasdg57

  • MD5

    209a288c68207d57e0ce6e60ebf60729

  • SHA1

    e654d39cd13414b5151e8cf0d8f5b166dddd45cb

  • SHA256

    3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370

  • SHA512

    ce4a7e42738154183fc53702f0841dfd4ad1eb0567b13cc1ff0909f1d330e9cd2fb994375efc6f02e7eddaaae1f465ff93458412143266afdaff1c6bf6477fc3

  • SSDEEP

    3072:rYXT8PUsMNL8V4tD2My/JAAbQoM29wlV58lbNnolY7VgsYiVTPtiTu/q:rowUsML8g2j0o9wb0bNoaKsYImui

Malware Config

Targets

    • Target

      3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370

    • Size

      284KB

    • MD5

      209a288c68207d57e0ce6e60ebf60729

    • SHA1

      e654d39cd13414b5151e8cf0d8f5b166dddd45cb

    • SHA256

      3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370

    • SHA512

      ce4a7e42738154183fc53702f0841dfd4ad1eb0567b13cc1ff0909f1d330e9cd2fb994375efc6f02e7eddaaae1f465ff93458412143266afdaff1c6bf6477fc3

    • SSDEEP

      3072:rYXT8PUsMNL8V4tD2My/JAAbQoM29wlV58lbNnolY7VgsYiVTPtiTu/q:rowUsML8g2j0o9wb0bNoaKsYImui

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Drops file in Drivers directory

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v6

Tasks