General
-
Target
2024-12-25_569d2b5701755260514fe1563d7530bb_rhysida
-
Size
497KB
-
Sample
241225-rqk56avpcj
-
MD5
569d2b5701755260514fe1563d7530bb
-
SHA1
4296b3794c3253434418f08fb933fd8a3880501e
-
SHA256
39d5df6362f22bdc4cecda164149ea0e66f93f61fe1f403f9c38666052f385ad
-
SHA512
3ddeecc152ecd8cb1a06300cbdc216e840397d2c33c4bacb9123e1e780b16ec15b2dac56ab821a576f06c42d516b9bc5876180bbb5cb3881f9a61915eec0d1f7
-
SSDEEP
6144:pgVoyb9e9BhrGcmofCJv47raqMFdIkR8492EgtuMf9opavgUnT:SGI47cIeL92EgUG9oyg
Behavioral task
behavioral1
Sample
2024-12-25_569d2b5701755260514fe1563d7530bb_rhysida.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-12-25_569d2b5701755260514fe1563d7530bb_rhysida.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-12-25_569d2b5701755260514fe1563d7530bb_rhysida
-
Size
497KB
-
MD5
569d2b5701755260514fe1563d7530bb
-
SHA1
4296b3794c3253434418f08fb933fd8a3880501e
-
SHA256
39d5df6362f22bdc4cecda164149ea0e66f93f61fe1f403f9c38666052f385ad
-
SHA512
3ddeecc152ecd8cb1a06300cbdc216e840397d2c33c4bacb9123e1e780b16ec15b2dac56ab821a576f06c42d516b9bc5876180bbb5cb3881f9a61915eec0d1f7
-
SSDEEP
6144:pgVoyb9e9BhrGcmofCJv47raqMFdIkR8492EgtuMf9opavgUnT:SGI47cIeL92EgUG9oyg
-
Detect Rhysida ransomware
-
Rhysida family
-
Clears Windows event logs
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8098) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Hide Artifacts: Hidden Window
Windows that would typically be displayed when an application carries out an operation can be hidden.
-
Indicator Removal: Clear Persistence
Clear artifacts associated with previously established persistence like scheduletasks on a host.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Hide Artifacts
1Hidden Window
1Indicator Removal
4Clear Persistence
1Clear Windows Event Logs
1File Deletion
2Modify Registry
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1