General

  • Target

    0d9f27b48a8377bd7eaf1e568c623a2c347a83627beac1745c3b06cfd8c3f31f

  • Size

    216KB

  • Sample

    240201-hkvyqsfehm

  • MD5

    d091bc54c6205d21cc79cf9df1b83df8

  • SHA1

    93b71efe69561bae75de70d63ba20fc33deac7a8

  • SHA256

    0d9f27b48a8377bd7eaf1e568c623a2c347a83627beac1745c3b06cfd8c3f31f

  • SHA512

    d17f4a64341bd2187b7b07721a23fe69ef9ecd595825cf2b8494e9c81e47717415d40eeced2aca992ff1631125b8b677c62afb597ed32684a7f1e78dd84e15a0

  • SSDEEP

    3072:n17DaAz38w3vT7F6PFwgBZTGFKQ+avVe+gGooSlFC2OLKKZAFEMpo4Iv1k:nb8OF6Pf2KQ+aVB2fJqh4Id

Score
10/10

Malware Config

Targets

    • Target

      0d9f27b48a8377bd7eaf1e568c623a2c347a83627beac1745c3b06cfd8c3f31f

    • Size

      216KB

    • MD5

      d091bc54c6205d21cc79cf9df1b83df8

    • SHA1

      93b71efe69561bae75de70d63ba20fc33deac7a8

    • SHA256

      0d9f27b48a8377bd7eaf1e568c623a2c347a83627beac1745c3b06cfd8c3f31f

    • SHA512

      d17f4a64341bd2187b7b07721a23fe69ef9ecd595825cf2b8494e9c81e47717415d40eeced2aca992ff1631125b8b677c62afb597ed32684a7f1e78dd84e15a0

    • SSDEEP

      3072:n17DaAz38w3vT7F6PFwgBZTGFKQ+avVe+gGooSlFC2OLKKZAFEMpo4Iv1k:nb8OF6Pf2KQ+aVB2fJqh4Id

    Score
    9/10
    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (299) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies boot configuration data using bcdedit

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks