General

  • Target

    2024-12-25_569d2b5701755260514fe1563d7530bb_rhysida

  • Size

    497KB

  • Sample

    241225-rqk56avpcj

  • MD5

    569d2b5701755260514fe1563d7530bb

  • SHA1

    4296b3794c3253434418f08fb933fd8a3880501e

  • SHA256

    39d5df6362f22bdc4cecda164149ea0e66f93f61fe1f403f9c38666052f385ad

  • SHA512

    3ddeecc152ecd8cb1a06300cbdc216e840397d2c33c4bacb9123e1e780b16ec15b2dac56ab821a576f06c42d516b9bc5876180bbb5cb3881f9a61915eec0d1f7

  • SSDEEP

    6144:pgVoyb9e9BhrGcmofCJv47raqMFdIkR8492EgtuMf9opavgUnT:SGI47cIeL92EgUG9oyg

Malware Config

Targets

    • Target

      2024-12-25_569d2b5701755260514fe1563d7530bb_rhysida

    • Size

      497KB

    • MD5

      569d2b5701755260514fe1563d7530bb

    • SHA1

      4296b3794c3253434418f08fb933fd8a3880501e

    • SHA256

      39d5df6362f22bdc4cecda164149ea0e66f93f61fe1f403f9c38666052f385ad

    • SHA512

      3ddeecc152ecd8cb1a06300cbdc216e840397d2c33c4bacb9123e1e780b16ec15b2dac56ab821a576f06c42d516b9bc5876180bbb5cb3881f9a61915eec0d1f7

    • SSDEEP

      6144:pgVoyb9e9BhrGcmofCJv47raqMFdIkR8492EgtuMf9opavgUnT:SGI47cIeL92EgUG9oyg

    • Detect Rhysida ransomware

    • Rhysida

      Rhysida is a ransomware that is written in C++ and discovered in 2023.

    • Rhysida family

    • Clears Windows event logs

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (8098) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

    • Indicator Removal: Clear Persistence

      Clear artifacts associated with previously established persistence like scheduletasks on a host.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks