General
-
Target
RNSM00437.7z
-
Size
24.1MB
-
Sample
241025-xqe7sstbrg
-
MD5
0de3692412ae76fef12b9ffd91cdab90
-
SHA1
6e493efc5f60e131c5e38ac232a1b69befff50b9
-
SHA256
70e8721a332c633435e6cdc9bcf3cd7d2b5e2c5f763b2dc61b358ca74f3b5762
-
SHA512
6a98e28c959a046f19ee79322be0f6a7cc70a0a0b57d577a9bb7c311442a36160c3ebaa3b5388c80cc2776c3a42286e1baf9a68275d7857aca324f5df311ff97
-
SSDEEP
786432:uAi/yqNNzDefs0eThJoFQ5TIrVpUFpMas:/iBrzCfFeTbCQFIrVpUFpHs
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00437.7z
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
RNSM00437.7z
-
Size
24.1MB
-
MD5
0de3692412ae76fef12b9ffd91cdab90
-
SHA1
6e493efc5f60e131c5e38ac232a1b69befff50b9
-
SHA256
70e8721a332c633435e6cdc9bcf3cd7d2b5e2c5f763b2dc61b358ca74f3b5762
-
SHA512
6a98e28c959a046f19ee79322be0f6a7cc70a0a0b57d577a9bb7c311442a36160c3ebaa3b5388c80cc2776c3a42286e1baf9a68275d7857aca324f5df311ff97
-
SSDEEP
786432:uAi/yqNNzDefs0eThJoFQ5TIrVpUFpMas:/iBrzCfFeTbCQFIrVpUFpHs
-
Detect MafiaWare666 ransomware
-
MafiaWare666 Ransomware
MafiaWare666 is ransomware written in C# with multiple variants.
-
Mafiaware666 family
-
VashSorena Golang binary
-
VashSorena Ransomware
Ransomware family with multiple versions/spinoffs. Decryption of files is generally possible without paying the ransom.
-
Vashsorena family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Modify Registry
1Pre-OS Boot
1Bootkit
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1