General

  • Target

    Dharma.exe

  • Size

    11.5MB

  • Sample

    241126-jasajaxnen

  • MD5

    928e37519022745490d1af1ce6f336f7

  • SHA1

    b7840242393013f2c4c136ac7407e332be075702

  • SHA256

    6fb303dd8ba36381948127d44bd8541e4a1ab8af07b46526ace08458f2498850

  • SHA512

    8040195ab2b2e15c9d5ffa13a47a61c709738d1cf5e2108e848fedf3408e5bad5f2fc5f523f170f6a80cb33a4f5612d3d60dd343d028e55cfc08cd2f6ed2947c

  • SSDEEP

    196608:JZnMy97vfgla5NX7YaP6uIEJsp+jb4agYSUpHm6g90MrYmhZZoG0tLzr1+W:LnMy9rfma5NrYaVzC0b4vpZZoG0tR+W

Malware Config

Targets

    • Target

      Dharma.exe

    • Size

      11.5MB

    • MD5

      928e37519022745490d1af1ce6f336f7

    • SHA1

      b7840242393013f2c4c136ac7407e332be075702

    • SHA256

      6fb303dd8ba36381948127d44bd8541e4a1ab8af07b46526ace08458f2498850

    • SHA512

      8040195ab2b2e15c9d5ffa13a47a61c709738d1cf5e2108e848fedf3408e5bad5f2fc5f523f170f6a80cb33a4f5612d3d60dd343d028e55cfc08cd2f6ed2947c

    • SSDEEP

      196608:JZnMy97vfgla5NX7YaP6uIEJsp+jb4agYSUpHm6g90MrYmhZZoG0tLzr1+W:LnMy9rfma5NrYaVzC0b4vpZZoG0tR+W

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Remote Service Session Hijacking: RDP Hijacking

      Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.

    • Modifies Windows Firewall

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Password Policy Discovery

      Attempt to access detailed information about the password policy used within an enterprise network.

    • Hide Artifacts: Hidden Users

MITRE ATT&CK Enterprise v15

Tasks