Resubmissions

16-12-2024 20:02

241216-yskezaznap 10

16-12-2024 20:00

241216-yrb27szmhl 9

16-12-2024 19:57

241216-yparcszmek 8

16-12-2024 19:52

241216-ylqneaypds 8

16-12-2024 19:49

241216-yjtbhsynhx 10

General

  • Target

    sample

  • Size

    258KB

  • Sample

    241216-yskezaznap

  • MD5

    37698ffffe211da5c8b3f97ec1f36bae

  • SHA1

    83f5b50f58b8c0a1451e8ba9f119b526abae76df

  • SHA256

    a9614c6564109168c11a853f00a2073803c8a26af2effa33b861d80f78121e54

  • SHA512

    368e0ee6d90d1f1746c23a520520a658964a7d289f846f2ed94772f28bb7331af763dc99fc7a8395c4a19314b35fbe9c5aa9e765cf7092e59cbd8f48f8ee3134

  • SSDEEP

    6144:giaRHpOL/saqkPV9FemLtcIDSsmwj9OvZJT3CqbMrhryf65NRPaCieMjAkvCJv1/:laRHpOL/saqkPV9FemLtcIDSsmwj9OvY

Malware Config

Targets

    • Target

      sample

    • Size

      258KB

    • MD5

      37698ffffe211da5c8b3f97ec1f36bae

    • SHA1

      83f5b50f58b8c0a1451e8ba9f119b526abae76df

    • SHA256

      a9614c6564109168c11a853f00a2073803c8a26af2effa33b861d80f78121e54

    • SHA512

      368e0ee6d90d1f1746c23a520520a658964a7d289f846f2ed94772f28bb7331af763dc99fc7a8395c4a19314b35fbe9c5aa9e765cf7092e59cbd8f48f8ee3134

    • SSDEEP

      6144:giaRHpOL/saqkPV9FemLtcIDSsmwj9OvZJT3CqbMrhryf65NRPaCieMjAkvCJv1/:laRHpOL/saqkPV9FemLtcIDSsmwj9OvY

    • BadRabbit

      Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

    • Badrabbit family

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Mimikatz family

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • mimikatz is an open source tool to dump credentials on Windows

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks