General

  • Target

    0ab68d9216c85e6ddd00ff80c9c441349b3d43f15d76fa4256e70f3585a84240.exe

  • Size

    216KB

  • Sample

    240128-x4zhlaaaej

  • MD5

    005cd35ae3c5d9c94da09408ad5a2e9f

  • SHA1

    0b2489d0b6cffe82d995cc3682cd338dcbd46ba1

  • SHA256

    28a0c6fe558e50b9d711b83913310fa8fb9937674c5b8980ed88ff7f1399abd9

  • SHA512

    dbcc5decfcd9e08c9fc195e77e93765f090846a5a37f731eabba1c9fdb64471d6ed6d656ae9884b129b75fe1dd30fa5d70deb914a403caf5142e2d534a2ec31a

  • SSDEEP

    3072:m17DaAz38w3vM7F6PFwgBZTGFKQ+avVe+gGooSlFC2OLKKZAFEMpo4Iv1k:Gb81F6Pf2KQ+aVB2fJqh4Id

Score
10/10

Malware Config

Targets

    • Target

      0ab68d9216c85e6ddd00ff80c9c441349b3d43f15d76fa4256e70f3585a84240.exe

    • Size

      216KB

    • MD5

      005cd35ae3c5d9c94da09408ad5a2e9f

    • SHA1

      0b2489d0b6cffe82d995cc3682cd338dcbd46ba1

    • SHA256

      28a0c6fe558e50b9d711b83913310fa8fb9937674c5b8980ed88ff7f1399abd9

    • SHA512

      dbcc5decfcd9e08c9fc195e77e93765f090846a5a37f731eabba1c9fdb64471d6ed6d656ae9884b129b75fe1dd30fa5d70deb914a403caf5142e2d534a2ec31a

    • SSDEEP

      3072:m17DaAz38w3vM7F6PFwgBZTGFKQ+avVe+gGooSlFC2OLKKZAFEMpo4Iv1k:Gb81F6Pf2KQ+aVB2fJqh4Id

    Score
    9/10
    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (298) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies boot configuration data using bcdedit

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks