General
-
Target
Trojan.Ransom.Satana.zip
-
Size
34KB
-
Sample
240329-3ddfbsbh6w
-
MD5
18881d488739f0fffa5f08c18d8a650d
-
SHA1
f1ad045b8d0a53c13cce1a18f1a2f59b5ca2dba9
-
SHA256
50716abdde2a383ed8c5da0c10d7c42e52a0d1c7b38878f1b130d08e13d5c5a5
-
SHA512
a0c303a37ad4dc56e938463003544bff50eddb8d13390d6890fe16a1d02b5e9f05a75cb5cf2cb0e6baad31514a025f7c07d8185f30facdff4051981524ecaf7c
-
SSDEEP
768:rZuS5bFDAovPXSyiIHcNNVt173snyUJNEbV33ARp:rZuS5jvPNih/H1738DQpQP
Static task
static1
Behavioral task
behavioral1
Sample
Trojan.Ransom.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Trojan.Ransom.exe
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
Trojan.Ransom.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
Trojan.Ransom.exe
Resource
win11-20240221-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\!satana!.txt
Targets
-
-
Target
Trojan.Ransom.Satana
-
Size
49KB
-
MD5
46bfd4f1d581d7c0121d2b19a005d3df
-
SHA1
5b063298bbd1670b4d39e1baef67f854b8dcba9d
-
SHA256
683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
-
SHA512
b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
-
SSDEEP
768:AbFw10RFnAwJM7MiqwecUaX5h4IuCdYa+XLXTGY1idL2WYiwtDj:Apw10vnAOIUaJh4IXdWXLXTWLfuFj
Score10/10-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1