General

  • Target

    2024-12-11_12f4660349ce0934b349151b4bd9f65c_crysis_dharma

  • Size

    92KB

  • Sample

    241211-dwzzlstqcx

  • MD5

    12f4660349ce0934b349151b4bd9f65c

  • SHA1

    9334fd66e9114405e328df960b0cc7685dff228f

  • SHA256

    913d5701360bffd2f5acbb6facb8f1a5021beef815adaeb6ac1273345d6d05e5

  • SHA512

    2c3bb5fb8f3e4d6c46ea4028fe80a12542cab0d0446f24f1f164e3ecbe9663f19b2accd6919a1e7697d16a40c210b5eb509e9690cc38e8a72f26e644b188b8a0

  • SSDEEP

    1536:mBwl+KXpsqN5vlwWYyhY9S4AgOWEtLXa7ujvLCh2k77Z8fDaQg9EgDCO/vf:Qw+asqN5aW/hLiOWsFj0vFaDaQSE3A3

Malware Config

Targets

    • Target

      2024-12-11_12f4660349ce0934b349151b4bd9f65c_crysis_dharma

    • Size

      92KB

    • MD5

      12f4660349ce0934b349151b4bd9f65c

    • SHA1

      9334fd66e9114405e328df960b0cc7685dff228f

    • SHA256

      913d5701360bffd2f5acbb6facb8f1a5021beef815adaeb6ac1273345d6d05e5

    • SHA512

      2c3bb5fb8f3e4d6c46ea4028fe80a12542cab0d0446f24f1f164e3ecbe9663f19b2accd6919a1e7697d16a40c210b5eb509e9690cc38e8a72f26e644b188b8a0

    • SSDEEP

      1536:mBwl+KXpsqN5vlwWYyhY9S4AgOWEtLXa7ujvLCh2k77Z8fDaQg9EgDCO/vf:Qw+asqN5aW/hLiOWsFj0vFaDaQSE3A3

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Dharma family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (313) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.