General

  • Target

    OlympicDestroyer.bin

  • Size

    1.8MB

  • Sample

    240921-etx8nsvbqr

  • MD5

    cfdd16225e67471f5ef54cab9b3a5558

  • SHA1

    26de43cc558a4e0e60eddd4dc9321bcb5a0a181c

  • SHA256

    edb1ff2521fb4bf748111f92786d260d40407a2e8463dcd24bb09f908ee13eb9

  • SHA512

    e1855a872f4db7c17eb22130d9cb205eddde641f1b39ea5de97dfb762fc97dc2347bc6e6e88b9c5a303e1540b4b4bdb19c839c7d3e237348adbfa4b942f24adb

  • SSDEEP

    49152:R9dnjRSnRMWHrVDoqNcVhcAwARGcWRrLy3pNq:3dVSRMUrVDEVHLRGdRrLy5N

Malware Config

Targets

    • Target

      OlympicDestroyer.bin

    • Size

      1.8MB

    • MD5

      cfdd16225e67471f5ef54cab9b3a5558

    • SHA1

      26de43cc558a4e0e60eddd4dc9321bcb5a0a181c

    • SHA256

      edb1ff2521fb4bf748111f92786d260d40407a2e8463dcd24bb09f908ee13eb9

    • SHA512

      e1855a872f4db7c17eb22130d9cb205eddde641f1b39ea5de97dfb762fc97dc2347bc6e6e88b9c5a303e1540b4b4bdb19c839c7d3e237348adbfa4b942f24adb

    • SSDEEP

      49152:R9dnjRSnRMWHrVDoqNcVhcAwARGcWRrLy3pNq:3dVSRMUrVDEVHLRGdRrLy5N

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Clears Windows event logs

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • mimikatz is an open source tool to dump credentials on Windows

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks