General

  • Target

    devilransom.exe

  • Size

    240KB

  • Sample

    240914-ypcwqasgnk

  • MD5

    b834c44a3e5298a3f23a1355409d2578

  • SHA1

    ba9fc22891f7480c49ee9e4d9409f833fc9484d8

  • SHA256

    a6ddcbca65d8fdd771f1d9e271a42e601fcebb5e6f6c49ec30113e930b2cd790

  • SHA512

    dad2007f6ffdae861cd7eec928a0b1dacf6058595bb9d33e1cd08701c721e347a04921e177e8639fef6e80e3fe29885f7067448f978921075b1e7490b40c0ad3

  • SSDEEP

    6144:UeLttJ+VSjv6S0qhH6NAw497/WBzzcT22sW6fvyENEb1HwoS:HLttJ+VSeS0e6N697/+zca2sFf6wtoS

Malware Config

Targets

    • Target

      devilransom.exe

    • Size

      240KB

    • MD5

      b834c44a3e5298a3f23a1355409d2578

    • SHA1

      ba9fc22891f7480c49ee9e4d9409f833fc9484d8

    • SHA256

      a6ddcbca65d8fdd771f1d9e271a42e601fcebb5e6f6c49ec30113e930b2cd790

    • SHA512

      dad2007f6ffdae861cd7eec928a0b1dacf6058595bb9d33e1cd08701c721e347a04921e177e8639fef6e80e3fe29885f7067448f978921075b1e7490b40c0ad3

    • SSDEEP

      6144:UeLttJ+VSjv6S0qhH6NAw497/WBzzcT22sW6fvyENEb1HwoS:HLttJ+VSeS0e6N697/+zca2sFf6wtoS

    • Modifies WinLogon for persistence

    • UAC bypass

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks