General

  • Target

    RNSM00437.7z

  • Size

    24.1MB

  • Sample

    241025-xqe7sstbrg

  • MD5

    0de3692412ae76fef12b9ffd91cdab90

  • SHA1

    6e493efc5f60e131c5e38ac232a1b69befff50b9

  • SHA256

    70e8721a332c633435e6cdc9bcf3cd7d2b5e2c5f763b2dc61b358ca74f3b5762

  • SHA512

    6a98e28c959a046f19ee79322be0f6a7cc70a0a0b57d577a9bb7c311442a36160c3ebaa3b5388c80cc2776c3a42286e1baf9a68275d7857aca324f5df311ff97

  • SSDEEP

    786432:uAi/yqNNzDefs0eThJoFQ5TIrVpUFpMas:/iBrzCfFeTbCQFIrVpUFpHs

Malware Config

Targets

    • Target

      RNSM00437.7z

    • Size

      24.1MB

    • MD5

      0de3692412ae76fef12b9ffd91cdab90

    • SHA1

      6e493efc5f60e131c5e38ac232a1b69befff50b9

    • SHA256

      70e8721a332c633435e6cdc9bcf3cd7d2b5e2c5f763b2dc61b358ca74f3b5762

    • SHA512

      6a98e28c959a046f19ee79322be0f6a7cc70a0a0b57d577a9bb7c311442a36160c3ebaa3b5388c80cc2776c3a42286e1baf9a68275d7857aca324f5df311ff97

    • SSDEEP

      786432:uAi/yqNNzDefs0eThJoFQ5TIrVpUFpMas:/iBrzCfFeTbCQFIrVpUFpHs

    • Detect MafiaWare666 ransomware

    • MafiaWare666 Ransomware

      MafiaWare666 is ransomware written in C# with multiple variants.

    • Mafiaware666 family

    • VashSorena Golang binary

    • VashSorena Ransomware

      Ransomware family with multiple versions/spinoffs. Decryption of files is generally possible without paying the ransom.

    • Vashsorena family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks