General

  • Target

    message (7).txt

  • Size

    1KB

  • Sample

    240817-3rsr6stfng

  • MD5

    7df4f2e62a5067fd6c83d0ff9c2300a3

  • SHA1

    b1f0ebec0ba659b80dbd05fd932d5e5505e585c0

  • SHA256

    dcf554a89df5bddfa712b0f4bdc6010ab3dc2308ce72e15e8020e9c75fcdcb01

  • SHA512

    906de77d22c14cbc0d6f8518bde97762e20f5c47204597bd257562e9ce4fe057d7ddb6775fa4a6738281168c19e9d2da95b2b308ba5ba0f7f19a9084a961922c

Malware Config

Targets

    • Target

      message (7).txt

    • Size

      1KB

    • MD5

      7df4f2e62a5067fd6c83d0ff9c2300a3

    • SHA1

      b1f0ebec0ba659b80dbd05fd932d5e5505e585c0

    • SHA256

      dcf554a89df5bddfa712b0f4bdc6010ab3dc2308ce72e15e8020e9c75fcdcb01

    • SHA512

      906de77d22c14cbc0d6f8518bde97762e20f5c47204597bd257562e9ce4fe057d7ddb6775fa4a6738281168c19e9d2da95b2b308ba5ba0f7f19a9084a961922c

    • CryptoLocker

      Ransomware family with multiple variants.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks