General

  • Target

    bt2-20230616_301_301002_301002101.exe

  • Size

    10.6MB

  • Sample

    230623-zvr39sab71

  • MD5

    3429c3be6c8c39bce465a2a8735dcc9f

  • SHA1

    e15458cafba1bc8180a9c587e2d84db7417caf7b

  • SHA256

    ad1da074b5a660e91c49c77d851b68137dc277f07c6e2ccd404b4ff7e5d76115

  • SHA512

    3a29c8a4aa38cb83fd2dbb8b2d3af7e0d88f7c2f346b98d42f2c79d0a0f56777e5f96969c11198145bdfa57fea1b70d017de5755ce87acd9f8ef7df337c8705a

  • SSDEEP

    196608:cgUPoZ+n584+baA/9/oC3/FwSb78nfXtkv2OwoY8NNSZSEGaYHmj:HZHNbaA/9/VvFwSHkdkOSTNNBEGaj

Malware Config

Targets

    • Target

      bt2-20230616_301_301002_301002101.exe

    • Size

      10.6MB

    • MD5

      3429c3be6c8c39bce465a2a8735dcc9f

    • SHA1

      e15458cafba1bc8180a9c587e2d84db7417caf7b

    • SHA256

      ad1da074b5a660e91c49c77d851b68137dc277f07c6e2ccd404b4ff7e5d76115

    • SHA512

      3a29c8a4aa38cb83fd2dbb8b2d3af7e0d88f7c2f346b98d42f2c79d0a0f56777e5f96969c11198145bdfa57fea1b70d017de5755ce87acd9f8ef7df337c8705a

    • SSDEEP

      196608:cgUPoZ+n584+baA/9/oC3/FwSb78nfXtkv2OwoY8NNSZSEGaYHmj:HZHNbaA/9/VvFwSHkdkOSTNNBEGaj

    • Detected Egregor ransomware

    • Egregor Ransomware

      Variant of the Sekhmet ransomware first seen in September 2020.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

4
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

4
T1082

Tasks