General

  • Target

    CSP.rar

  • Size

    201KB

  • Sample

    230922-ks8wnseh7y

  • MD5

    3cdbecc353ccb99a9bec6f32d398dafe

  • SHA1

    9c9221dd822b6545fdda3750e21849805c310a14

  • SHA256

    d0e352ba8198a9791bc21df9d40da653c8d267364fdd652cf534645bccd2c579

  • SHA512

    1d7e83c33889b16640b751e239c0ece34509f617d1a94936182611375a5457c3348d3c59aeb93647f2792ae5f1c9773161940d5dd4f1ac4f4629e00750d0bc3b

  • SSDEEP

    6144:icVWp2tYPaUWqB9bJZAtkPPd5EHk3p1BC:iVqwaizb5Pdl6

Score
10/10

Malware Config

Targets

    • Target

      CSP/CSPSetup.exe

    • Size

      337KB

    • MD5

      e21e58ae803e22166cbade636b658ee6

    • SHA1

      4522f09f824d56594e3108eda0ece67a529de31b

    • SHA256

      5f7527bdb49d1f6a440aad9296888f8884818bea3b6af7d85da1ee5bde7f2574

    • SHA512

      6120f76bb8ee57be38681a71ccffc14c6f6a2e10b0a9df7ab95d1d596ff7eb590f2c4d0087ba4b24d1105d2b7b920621146c25dc026ebf6a96297b8f9edbfdbb

    • SSDEEP

      6144:LOYGXaPNxdgSdcq2pVZPOJHAbKL2grda6CtHjuKHOtugq:fGqN/XdctpVtkb2grU6+Hau3

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Indicator Removal

2
T1070

File Deletion

2
T1070.004

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Impact

Inhibit System Recovery

2
T1490

Tasks