General

  • Target

    52b973c029f230ba1049d1438ff7a960exe_JC.exe

  • Size

    440KB

  • Sample

    230916-vxxdjsfa22

  • MD5

    52b973c029f230ba1049d1438ff7a960

  • SHA1

    c7c8790cd93463fea65921abfb44a5ed81788ab5

  • SHA256

    a8987722e326199edfa57b05912e962115d7e408ece800b53ed84a78d6a195a6

  • SHA512

    7b3b7aff02e7e15c557c618abfd243bb3b6510914aa8b2ea1eef76186c2ef7045a3848cded0b4530c67c113824c5b066fbca18df0f8a09e3e76795947d458605

  • SSDEEP

    6144:LQkAFTZe+DD2/wNvGaNgmQPzSI58KP0Pt8piGijRTGJd9jB:kTFTZFDGwtGigBFeKP0Pt+iGEMTd

Malware Config

Targets

    • Target

      52b973c029f230ba1049d1438ff7a960exe_JC.exe

    • Size

      440KB

    • MD5

      52b973c029f230ba1049d1438ff7a960

    • SHA1

      c7c8790cd93463fea65921abfb44a5ed81788ab5

    • SHA256

      a8987722e326199edfa57b05912e962115d7e408ece800b53ed84a78d6a195a6

    • SHA512

      7b3b7aff02e7e15c557c618abfd243bb3b6510914aa8b2ea1eef76186c2ef7045a3848cded0b4530c67c113824c5b066fbca18df0f8a09e3e76795947d458605

    • SSDEEP

      6144:LQkAFTZe+DD2/wNvGaNgmQPzSI58KP0Pt8piGijRTGJd9jB:kTFTZFDGwtGigBFeKP0Pt+iGEMTd

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (303) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Renames multiple (434) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Indicator Removal

2
T1070

File Deletion

2
T1070.004

Modify Registry

2
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Impact

Inhibit System Recovery

2
T1490

Defacement

1
T1491

Tasks