General

  • Target

    70f267b878de849155db26eb85026868

  • Size

    1.2MB

  • Sample

    240124-anzr4adfd7

  • MD5

    70f267b878de849155db26eb85026868

  • SHA1

    598e26d064075b4a471a85fbcca269f19a2ae394

  • SHA256

    ca3c9fb0766ab97ddc2209189ca76335bc977c7e65bb8cecebbed94288017e80

  • SHA512

    3173819bbc1693cc0627122a08ac288070ac6f2ed7648a2bbd4c89d6b21dedfabd2ee5952658f7a058aa9f6670c0e97da7cc6cea89812d64d2138f68793886c3

  • SSDEEP

    12288:gp4pNfz3ymJnJ8QCFkxCaQTOl2GVq5w+kCbBmBCHm:aEtl9mRda1VI5wRCHm

Score
10/10

Malware Config

Targets

    • Target

      70f267b878de849155db26eb85026868

    • Size

      1.2MB

    • MD5

      70f267b878de849155db26eb85026868

    • SHA1

      598e26d064075b4a471a85fbcca269f19a2ae394

    • SHA256

      ca3c9fb0766ab97ddc2209189ca76335bc977c7e65bb8cecebbed94288017e80

    • SHA512

      3173819bbc1693cc0627122a08ac288070ac6f2ed7648a2bbd4c89d6b21dedfabd2ee5952658f7a058aa9f6670c0e97da7cc6cea89812d64d2138f68793886c3

    • SSDEEP

      12288:gp4pNfz3ymJnJ8QCFkxCaQTOl2GVq5w+kCbBmBCHm:aEtl9mRda1VI5wRCHm

    Score
    10/10
    • Modifies WinLogon for persistence

    • Renames multiple (91) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks