General
-
Target
1tl6myb9
-
Size
195KB
-
Sample
230621-k9lgpsgd66
-
MD5
4d3f5c9faf7f8770a587efb81cbde114
-
SHA1
2a6cc16644e4722d2e8c584478bdaa22677aa681
-
SHA256
5627d60a6e27c4f16d888a90372f89bd8eb34b787a98bc67825dd1f4a8a5001f
-
SHA512
dac4ba41d0b8b02a20d07ec16fb0952b66f1d5fdde55f8c18b9dd5750aae0d6c2aa899877dc2ce8e075b977053998ee2f81a415a3513958234ed126f5c348f2f
-
SSDEEP
1536:DAW2QlQSbxfGEDO440vgdxCXqGv5EFM37Y3CXP4X10k50W0U30zU0Yj/bz4sIkBM:DAWXk0c3+P4X2Sj/bz4sIkButb3hmi
Static task
static1
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___2EAU_.txt
cerber
http://xpcx6erilkjced3j.onion/5010-3EEA-F66E-0098-B586
http://xpcx6erilkjced3j.1n5mod.top/5010-3EEA-F66E-0098-B586
http://xpcx6erilkjced3j.19kdeh.top/5010-3EEA-F66E-0098-B586
http://xpcx6erilkjced3j.1mpsnr.top/5010-3EEA-F66E-0098-B586
http://xpcx6erilkjced3j.18ey8e.top/5010-3EEA-F66E-0098-B586
http://xpcx6erilkjced3j.17gcun.top/5010-3EEA-F66E-0098-B586
Extracted
C:\Program Files\7-Zip\Lang\DECRYPT_YOUR_FILES.HTML
Targets
-
-
Target
1tl6myb9
-
Size
195KB
-
MD5
4d3f5c9faf7f8770a587efb81cbde114
-
SHA1
2a6cc16644e4722d2e8c584478bdaa22677aa681
-
SHA256
5627d60a6e27c4f16d888a90372f89bd8eb34b787a98bc67825dd1f4a8a5001f
-
SHA512
dac4ba41d0b8b02a20d07ec16fb0952b66f1d5fdde55f8c18b9dd5750aae0d6c2aa899877dc2ce8e075b977053998ee2f81a415a3513958234ed126f5c348f2f
-
SSDEEP
1536:DAW2QlQSbxfGEDO440vgdxCXqGv5EFM37Y3CXP4X10k50W0U30zU0Yj/bz4sIkBM:DAWXk0c3+P4X2Sj/bz4sIkButb3hmi
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
Renames multiple (1919) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
mimikatz is an open source tool to dump credentials on Windows
-
Blocklisted process makes network request
-
Contacts a large (1122) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-