General

  • Target

    mimicransomware_enc_infected.exe

  • Size

    2.4MB

  • Sample

    240429-ksgr7aef62

  • MD5

    2a613d677cc3e2991dcd954e9413c40c

  • SHA1

    26f49090585d31dca8dde83106c0a851f00f2f18

  • SHA256

    c7adce3459f21a1afb62f779d8baaa2ea3e7614b8fa312ac67725d532c15c54b

  • SHA512

    b3edc9f56aa9c1f3685bb7e14d7dad27f23346bb1f21618acb3091c2031c1c5f48f77f375d97763b2da1b4658efd12a1147114bd65190b9f8c772d302d0f7a44

  • SSDEEP

    49152:I/oSNzCxuPz3v/EekOEQ5ZlC2WQcyDJFD6BaKAjB8eJMv+8KwXkZx+jau:I/oCCQv/EeJESlC2WbyDukrBDJMGXjG

Malware Config

Targets

    • Target

      mimicransomware_enc_infected.exe

    • Size

      2.4MB

    • MD5

      2a613d677cc3e2991dcd954e9413c40c

    • SHA1

      26f49090585d31dca8dde83106c0a851f00f2f18

    • SHA256

      c7adce3459f21a1afb62f779d8baaa2ea3e7614b8fa312ac67725d532c15c54b

    • SHA512

      b3edc9f56aa9c1f3685bb7e14d7dad27f23346bb1f21618acb3091c2031c1c5f48f77f375d97763b2da1b4658efd12a1147114bd65190b9f8c772d302d0f7a44

    • SSDEEP

      49152:I/oSNzCxuPz3v/EekOEQ5ZlC2WQcyDJFD6BaKAjB8eJMv+8KwXkZx+jau:I/oCCQv/EeJESlC2WbyDukrBDJMGXjG

    • Detects Mimic ransomware

    • Mimic

      Ransomware family was first exploited in the wild in 2022.

    • Modifies security service

    • Clears Windows event logs

    • Modifies boot configuration data using bcdedit

    • Deletes System State backups

      Uses wbadmin.exe to inhibit system recovery.

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks