General

  • Target

    2a50a42d3c44e6e3890a53228cb84f6fdb17e38b31422c68b8634a06d36cc324_JC.exe

  • Size

    382KB

  • Sample

    231014-epycwafh3z

  • MD5

    7e8b8c909f96c4058a7e8f7acd171a78

  • SHA1

    a0f2cc3a7fcb60f7389ee4555dbddc2ad5822c7e

  • SHA256

    2a50a42d3c44e6e3890a53228cb84f6fdb17e38b31422c68b8634a06d36cc324

  • SHA512

    5959a1b5e03f4b6d7ce837fab5bdce52ef8073666a4445e7d49904e252cf9d9233355bbd54eefd449528070de43d0f64b47bbef8160e2fee4a0dda292520c922

  • SSDEEP

    6144:MemFwi7Aaj8cDtp5adXbu7FK6jT92wiGgYP91k0dMENe2RurYEhM9+:Mnwi7RDtja5qN2PRYk0d/VRl

Malware Config

Targets

    • Target

      2a50a42d3c44e6e3890a53228cb84f6fdb17e38b31422c68b8634a06d36cc324_JC.exe

    • Size

      382KB

    • MD5

      7e8b8c909f96c4058a7e8f7acd171a78

    • SHA1

      a0f2cc3a7fcb60f7389ee4555dbddc2ad5822c7e

    • SHA256

      2a50a42d3c44e6e3890a53228cb84f6fdb17e38b31422c68b8634a06d36cc324

    • SHA512

      5959a1b5e03f4b6d7ce837fab5bdce52ef8073666a4445e7d49904e252cf9d9233355bbd54eefd449528070de43d0f64b47bbef8160e2fee4a0dda292520c922

    • SSDEEP

      6144:MemFwi7Aaj8cDtp5adXbu7FK6jT92wiGgYP91k0dMENe2RurYEhM9+:Mnwi7RDtja5qN2PRYk0d/VRl

    • Phobos

      Phobos ransomware appeared at the beginning of 2019.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Renames multiple (128) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Renames multiple (89) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Modifies Windows Firewall

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks