General
-
Target
JaffaCakes118_e88f86634b1a30b45429d6f721fef75902fb55a78629f1c0193e1629e955a55d
-
Size
113KB
-
Sample
241226-wehywatkgr
-
MD5
e007d203eb070e1f35fb2c791343a9e2
-
SHA1
fc1f90411c94a59edf6cc42af77ecb654bce973a
-
SHA256
e88f86634b1a30b45429d6f721fef75902fb55a78629f1c0193e1629e955a55d
-
SHA512
260d804b6a9a086b01c68f70f246fcab011eff30cd6bc48006d08c1479554b9bf6bcacd0b1e0f749e315837ebdaf46f99bba9ff5c9a105ab42a28cf40de8d56b
-
SSDEEP
3072:XaTWIP48EqyxjXzxAeADCEbAwHGl1OPTXGESdzP9:Xar4TzVDuDCEbA8GOWEW
Static task
static1
Behavioral task
behavioral1
Sample
dll64.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dll64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
eiavW.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
eiavW.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
icedid
2642071409
netmoscito2.uno
Extracted
C:\RyukReadMe.txt
ryuk
15RLWdVnY5n1n7mTvU1zjg67wt86dhYqNj
Targets
-
-
Target
dll64.dll
-
Size
43KB
-
MD5
cfad79ca83be1a597222a14d4afb8dbd
-
SHA1
4c2f0f0fad519bcbe7616fd0452dcfb9b0fb2081
-
SHA256
e53d34c5a00e62c90781e918fd5a198475d259a9017cd2b1b5d9b91350c1e876
-
SHA512
8abf010ebd670d90f06e0d2a8e92d84ff8dd3ab3cac03bb11cc5e344a26fb19afae033d86e8f77ecbe2ed0c5b960b42fe7b59a2cbd160f88fd091cd5904f1af4
-
SSDEEP
768:d39DqSdbgOgeRFb8w0E0o9z77Q+bDjBWSNMghNTbDKTvNo4ROIaSJd:L3dFRZ8wUG/DNBVbDKTi4RySJd
Score10/10-
Icedid family
-
IcedID First Stage Loader
-
-
-
Target
eiavW.exe
-
Size
172KB
-
MD5
c0202cf6aeab8437c638533d14563d35
-
SHA1
5767653494d05b3f3f38f1662a63335d09ae6489
-
SHA256
8d3f68b16f0710f858d8c1d2c699260e6f43161a5510abb0e7ba567bd72c965b
-
SHA512
02516128d43914d6ff1b7e702d25771aafd2edccee1729f88ad621cea15a648bb2737b87f564e0711e6f8f99c43eb406b3b6137c68086774f1417642d51c07c0
-
SSDEEP
3072:tEyekjv8/eFJ59W2+yV3XgDJ/nptkIV77pJd7RQy+P/:qMo/eF7EDyVgFfn7QyK
-
Ryuk family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1