General
-
Target
drum kit_sound.wav
-
Size
187KB
-
Sample
241115-vavans1pcl
-
MD5
cc3076fd52cb56a0e8b5736edf9355c7
-
SHA1
deaa3a347763021649e8aae1c5c5f23b8f8a8143
-
SHA256
d3b1623d3be54832a44b509d1d0b7a8685abeea26b42c7e09a87467927dd8f7b
-
SHA512
ab54ea1315d70f88e4f7c0afc4f321ccfd056daeb77a53644eb8f31ee82aeef47a0af9d109fc95b779add7f61e900d6f703d9781370a251b5adb54962e540519
-
SSDEEP
3072:uul7lHZycwPgqmt+iGTvIiA6/N6HJatSHvArukZHbVdJy6ynEQ1irxAw0O:uyVcGqu+pv7ACNhgH+Fy6T
Static task
static1
Behavioral task
behavioral1
Sample
drum kit_sound.wav
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
drum kit_sound.wav
-
Size
187KB
-
MD5
cc3076fd52cb56a0e8b5736edf9355c7
-
SHA1
deaa3a347763021649e8aae1c5c5f23b8f8a8143
-
SHA256
d3b1623d3be54832a44b509d1d0b7a8685abeea26b42c7e09a87467927dd8f7b
-
SHA512
ab54ea1315d70f88e4f7c0afc4f321ccfd056daeb77a53644eb8f31ee82aeef47a0af9d109fc95b779add7f61e900d6f703d9781370a251b5adb54962e540519
-
SSDEEP
3072:uul7lHZycwPgqmt+iGTvIiA6/N6HJatSHvArukZHbVdJy6ynEQ1irxAw0O:uyVcGqu+pv7ACNhgH+Fy6T
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
Badrabbit family
-
Mimikatz family
-
Modifies WinLogon for persistence
-
mimikatz is an open source tool to dump credentials on Windows
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1