General
-
Target
1.exe
-
Size
275KB
-
Sample
240619-12gfsaybqm
-
MD5
b61525d88761a974e57c8257c76ec999
-
SHA1
231893b80d83f297ebdc760d4a1388afd98a4dd6
-
SHA256
6abd97d20372a17384c5fd928ef5548da218b615247276acd7bf0a62ad3cf6e7
-
SHA512
0ab047b99ef446056fac3f45b62c1c65fc8675c2fff938ba3c88fe600aa969b030b2d1474bece5305e40a2220fbbdaeb0584a1630fce3b53535bb9a27ee6b53c
-
SSDEEP
6144:ITR3vnpRfE/UVPy/oCa+LDZWC9z5KIFXWBHdZ6Nba09IdkaNiTN:I3vnpRfzPygCa+DZvXWP09IGC2
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
1.exe
Resource
win11-20240508-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.encompossoftware.com - Port:
21 - Username:
remoteuser - Password:
Encomposx99
Targets
-
-
Target
1.exe
-
Size
275KB
-
MD5
b61525d88761a974e57c8257c76ec999
-
SHA1
231893b80d83f297ebdc760d4a1388afd98a4dd6
-
SHA256
6abd97d20372a17384c5fd928ef5548da218b615247276acd7bf0a62ad3cf6e7
-
SHA512
0ab047b99ef446056fac3f45b62c1c65fc8675c2fff938ba3c88fe600aa969b030b2d1474bece5305e40a2220fbbdaeb0584a1630fce3b53535bb9a27ee6b53c
-
SSDEEP
6144:ITR3vnpRfE/UVPy/oCa+LDZWC9z5KIFXWBHdZ6Nba09IdkaNiTN:I3vnpRfzPygCa+DZvXWP09IGC2
-
Modifies security service
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1Hide Artifacts
4Hidden Files and Directories
4Impair Defenses
2Disable or Modify Tools
2Indicator Removal
2File Deletion
2Modify Registry
5