General
-
Target
RNSM00294.7z
-
Size
18.3MB
-
Sample
241117-vvq4ravcmd
-
MD5
35f36146d16e76854de00c15cd264590
-
SHA1
9b9cbc5a04440a9e6f677bbced1ba1c87b3fa77f
-
SHA256
ac2e8a7e7efa633d42c18b4fb526aca8a64730f647bd31ee6dc739092051c837
-
SHA512
d17ade4aa19156b185655a33e9645ab0f1762558e8c0ddd441b23c931755ea0c21893a7e5446b8bbe27c504d0f355c556777e0400aba318e24d5ca9c472a837c
-
SSDEEP
393216:SBqZJmSJMZd5kVWyO7fIFmgUh1dAnA3cIDbfXGJ8o7hnvHEYML05Ei:ScZP+ZrHyOTknUh1dIkjXGmShnBML4B
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00294.7z
Resource
win7-20240903-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.unlockers.us - Port:
21 - Username:
[email protected] - Password:
1122334455
Extracted
C:\Users\Public\Videos\how_to_back_files.html
class="mark">[email protected]</span>
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+iabxp.txt
http://p57gest54celltraf743knjf.mottesapo.com/A97B535C5665D87
http://k4restportgonst34d23r.oftpony.at/A97B535C5665D87
http://rr7mdgjbjhbefvkhbashrg.ginnypecht.com/A97B535C5665D87
http://fwgrhsao3aoml7ej.onion/A97B535C5665D87
http://fwgrhsao3aoml7ej.ONION/A97B535C5665D87
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+ireyp.txt
http://rr7mdgjbjhbefvkhbashrg.ginnypecht.com/A97B535C5665D87
http://kk4dshfjn45tsnkdf34fg.tatiejava.at/A97B535C5665D87
http://94375hfsjhbdfkj5wfg.aladadear.com/A97B535C5665D87
http://fwgrhsao3aoml7ej.onion/A97B535C5665D87
http://fwgrhsao3aoml7ej.ONION/A97B535C5665D87
Extracted
C:\Users\Admin\Contacts\_README_.hta
Extracted
C:\Users\Public\Recorded TV\_R_E_A_D___T_H_I_S___ZOP1Q_.txt
cerber
http://xpcx6erilkjced3j.onion/7035-0219-FB58-0098-952F
http://xpcx6erilkjced3j.17gcun.top/7035-0219-FB58-0098-952F
http://xpcx6erilkjced3j.1ebjjq.top/7035-0219-FB58-0098-952F
http://xpcx6erilkjced3j.15ezkm.top/7035-0219-FB58-0098-952F
http://xpcx6erilkjced3j.1mfmkz.top/7035-0219-FB58-0098-952F
http://xpcx6erilkjced3j.1jmu65.top/7035-0219-FB58-0098-952F
Targets
-
-
Target
RNSM00294.7z
-
Size
18.3MB
-
MD5
35f36146d16e76854de00c15cd264590
-
SHA1
9b9cbc5a04440a9e6f677bbced1ba1c87b3fa77f
-
SHA256
ac2e8a7e7efa633d42c18b4fb526aca8a64730f647bd31ee6dc739092051c837
-
SHA512
d17ade4aa19156b185655a33e9645ab0f1762558e8c0ddd441b23c931755ea0c21893a7e5446b8bbe27c504d0f355c556777e0400aba318e24d5ca9c472a837c
-
SSDEEP
393216:SBqZJmSJMZd5kVWyO7fIFmgUh1dAnA3cIDbfXGJ8o7hnvHEYML05Ei:ScZP+ZrHyOTknUh1dIkjXGmShnBML4B
-
Cerber family
-
Detected Xorist Ransomware
-
Locky family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Xorist family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (1496) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Clears Network RDP Connection History and Configurations
Remove evidence of malicious network connections to clean up operations traces.
-
Contacts a large (1646) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Direct Volume Access
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
4Clear Network Connection History and Configurations
1File Deletion
3Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1