General

  • Target

    x86.elf

  • Size

    69KB

  • Sample

    240528-nz5z5sac8z

  • MD5

    69d6742b9c30b4db18f1269a7ced3b06

  • SHA1

    92d77fcabd9bcbdb185a6184d0b596f4911c006a

  • SHA256

    1b5f44e7b5ca33ab4f96110ac7a5b6d2d48768a46ac4907660a3651adb3f2762

  • SHA512

    20123b3941a0a1e13eccb34fc16e9491d639795590d5379e166d95ced2874010c2e4d8b617e459a82bc7eb4548f4d90d36e930a0084e65336c7e9b9c27a45ebb

  • SSDEEP

    1536:ZTwUQG9ZssVojh3hH/8bDUXnHX7ZYkmlV9DYr:ZTBQGzpkhpN3ZsA

Malware Config

Targets

    • Target

      x86.elf

    • Size

      69KB

    • MD5

      69d6742b9c30b4db18f1269a7ced3b06

    • SHA1

      92d77fcabd9bcbdb185a6184d0b596f4911c006a

    • SHA256

      1b5f44e7b5ca33ab4f96110ac7a5b6d2d48768a46ac4907660a3651adb3f2762

    • SHA512

      20123b3941a0a1e13eccb34fc16e9491d639795590d5379e166d95ced2874010c2e4d8b617e459a82bc7eb4548f4d90d36e930a0084e65336c7e9b9c27a45ebb

    • SSDEEP

      1536:ZTwUQG9ZssVojh3hH/8bDUXnHX7ZYkmlV9DYr:ZTBQGzpkhpN3ZsA

    • Ouroboros/Zeropadypt

      Ransomware family based on open-source CryptoWire.

    • Contacts a large (1298151) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Enterprise v15

Tasks