General

  • Target

    2025-02-05_f3f1c4b0746b99a513876f5c61e2ad47_makop

  • Size

    49KB

  • Sample

    250205-d6hs3sxmhy

  • MD5

    f3f1c4b0746b99a513876f5c61e2ad47

  • SHA1

    e9851fdcdbe37ed4d8fabedd02862e5fe1edea5a

  • SHA256

    4d5368ea6488cedce01f8b2c1ed77e45d37dc2adf1ed0bada3932412bc0732f0

  • SHA512

    b1105d997db5563464610fa29e5cf7769978188a70c137f305cbf12d189c3309cc5b8dcf5c5b3c270859e138533897920a1c6cdd1a20575b7b1a4f37731e4a73

  • SSDEEP

    768:NAxPvARD1ayCt3LSUS6QCA3KlRDsKeqRO8785F7HyFj6cBCE2fje0YADpnsTqFoN:NnD183dAalnudHyFj6cBSfdYOJU5Xo

Malware Config

Targets

    • Target

      2025-02-05_f3f1c4b0746b99a513876f5c61e2ad47_makop

    • Size

      49KB

    • MD5

      f3f1c4b0746b99a513876f5c61e2ad47

    • SHA1

      e9851fdcdbe37ed4d8fabedd02862e5fe1edea5a

    • SHA256

      4d5368ea6488cedce01f8b2c1ed77e45d37dc2adf1ed0bada3932412bc0732f0

    • SHA512

      b1105d997db5563464610fa29e5cf7769978188a70c137f305cbf12d189c3309cc5b8dcf5c5b3c270859e138533897920a1c6cdd1a20575b7b1a4f37731e4a73

    • SSDEEP

      768:NAxPvARD1ayCt3LSUS6QCA3KlRDsKeqRO8785F7HyFj6cBCE2fje0YADpnsTqFoN:NnD183dAalnudHyFj6cBSfdYOJU5Xo

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (8316) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks