General

  • Target

    Frozen_cracked.exe

  • Size

    784KB

  • Sample

    240629-ranw4syflg

  • MD5

    26348de5340c8ec99091699776a2027a

  • SHA1

    3d004406d2467af78f90aaaf3312839e83a43883

  • SHA256

    f25d3ed9eab66e7c08fd2c2778bab2319631bbcff3bb08415604e0c27b002b24

  • SHA512

    08ca1b4a82c9ceeb604533d3622a6864083288bc86046ba7e2d20639d5fcf2605eefe06a3adb9952415ecab8f42f647b76ae540d2d4e235b7ac0967de851bb78

  • SSDEEP

    12288:mijyh17Ln+wwu2LjKDYsXCuQN/MGHaF9Eq2U3u:+h1Xnf4jcYsSpMGHaEq2uu

Malware Config

Targets

    • Target

      Frozen_cracked.exe

    • Size

      784KB

    • MD5

      26348de5340c8ec99091699776a2027a

    • SHA1

      3d004406d2467af78f90aaaf3312839e83a43883

    • SHA256

      f25d3ed9eab66e7c08fd2c2778bab2319631bbcff3bb08415604e0c27b002b24

    • SHA512

      08ca1b4a82c9ceeb604533d3622a6864083288bc86046ba7e2d20639d5fcf2605eefe06a3adb9952415ecab8f42f647b76ae540d2d4e235b7ac0967de851bb78

    • SSDEEP

      12288:mijyh17Ln+wwu2LjKDYsXCuQN/MGHaF9Eq2U3u:+h1Xnf4jcYsSpMGHaEq2uu

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies Windows Firewall

    • Stops running service(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks