General

  • Target

    9b41b6d023dd155fd7266214740f646945bdbfd93e0ebd2071e9cefc801cc773.exe

  • Size

    216KB

  • Sample

    240123-k7g2hahacj

  • MD5

    6ffd8b358a36619e924979df1684c8b9

  • SHA1

    1af838ff502c54f03fe30d19584549aae59ba0d6

  • SHA256

    9b41b6d023dd155fd7266214740f646945bdbfd93e0ebd2071e9cefc801cc773

  • SHA512

    2d1fb161e1754faf0b84958424330f12f234125f1cb5e020e89cbc0506d15a0d331455bbc4d7bf89c1bdd1d240fe6dd4e65715a9bf93e4afdf79b61c45c27bb3

  • SSDEEP

    3072:h17DaAz38w3vs7F6PFwgBZTGFKQ+avVe+gGooSlFC2OLKKZAFEMpo4Iv1k:Fb8FF6Pf2KQ+aVB2fJqh4Id

Score
10/10

Malware Config

Targets

    • Target

      9b41b6d023dd155fd7266214740f646945bdbfd93e0ebd2071e9cefc801cc773.exe

    • Size

      216KB

    • MD5

      6ffd8b358a36619e924979df1684c8b9

    • SHA1

      1af838ff502c54f03fe30d19584549aae59ba0d6

    • SHA256

      9b41b6d023dd155fd7266214740f646945bdbfd93e0ebd2071e9cefc801cc773

    • SHA512

      2d1fb161e1754faf0b84958424330f12f234125f1cb5e020e89cbc0506d15a0d331455bbc4d7bf89c1bdd1d240fe6dd4e65715a9bf93e4afdf79b61c45c27bb3

    • SSDEEP

      3072:h17DaAz38w3vs7F6PFwgBZTGFKQ+avVe+gGooSlFC2OLKKZAFEMpo4Iv1k:Fb8FF6Pf2KQ+aVB2fJqh4Id

    Score
    9/10
    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (295) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies boot configuration data using bcdedit

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks