General
-
Target
verify-ua
-
Size
5KB
-
Sample
241026-qln6ksslcl
-
MD5
bdcd890677a32b056ffd78cd896eff89
-
SHA1
92ab74ed8d40e336c4c33a44435521f377007df8
-
SHA256
1041a83d20c8cb7b9303c65aa563078dc4b10e6db8f3547b74278bc6c0644e98
-
SHA512
3bedc2cec5f892c688811feaacff43845762be06e212510cba9abd9080ffa849c46ca2566722ab3f2c25afda3cb9baaa5e78e1e6c8351ea41eb3add49e75cc01
-
SSDEEP
96:GiOts4fcZxpPsCkHInCnir7NVirCQXqHVoITMF6apE4sW:7Ots5sGnRTirio6+sW
Static task
static1
Behavioral task
behavioral1
Sample
verify-ua.html
Resource
win11-20241007-en
Malware Config
Extracted
C:\Recovery\WindowsRE\README_HOW_TO_UNLOCK.TXT
http://zvnvp2rhe3ljwf2m.onion
Targets
-
-
Target
verify-ua
-
Size
5KB
-
MD5
bdcd890677a32b056ffd78cd896eff89
-
SHA1
92ab74ed8d40e336c4c33a44435521f377007df8
-
SHA256
1041a83d20c8cb7b9303c65aa563078dc4b10e6db8f3547b74278bc6c0644e98
-
SHA512
3bedc2cec5f892c688811feaacff43845762be06e212510cba9abd9080ffa849c46ca2566722ab3f2c25afda3cb9baaa5e78e1e6c8351ea41eb3add49e75cc01
-
SSDEEP
96:GiOts4fcZxpPsCkHInCnir7NVirCQXqHVoITMF6apE4sW:7Ots5sGnRTirio6+sW
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
Badrabbit family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (65) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables use of System Restore points
-
Event Triggered Execution: Image File Execution Options Injection
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Indicator Removal
2File Deletion
2Modify Registry
4