General

  • Target

    2025-02-27_8f55ce9352a6fb03e3d87f8ed1ffaa7f_dharma_ramnit

  • Size

    200KB

  • Sample

    250227-hvy35s1jw7

  • MD5

    8f55ce9352a6fb03e3d87f8ed1ffaa7f

  • SHA1

    1c5d21857b4329fee9257d8608134b2f94ea149c

  • SHA256

    590d3c67a0d4bdcfdabdc579ba3ef3e035144c7b422af7d083d30f6f53ce7cc4

  • SHA512

    3d2dfa038b24aa2e4bfdcef334fbe03679a9c56fcbc47267fb4dd4e2cdbd6906c2711c82573399ee7a91932ac5cec998b9053ffdd68ae61f8f4802d0d48c4b6e

  • SSDEEP

    6144:yw+E6shLjgYIz+X303peGbfUTpYDDmu/+3fbY:ycjgLzs0sG+pG/YY

Malware Config

Extracted

Path

C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta

Ransom Note
YOUR FILES ARE ENCRYPTED Don't worry,you can return all your files! If you want to restore them, follow this link: email [email protected] YOUR ID If you have not been answered via the link within 12 hours, write to us by e-mail: [email protected] Attention! Do not rename encrypted files. Do not try to decrypt your data using third party software, it may cause permanent data loss. Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Targets

    • Target

      2025-02-27_8f55ce9352a6fb03e3d87f8ed1ffaa7f_dharma_ramnit

    • Size

      200KB

    • MD5

      8f55ce9352a6fb03e3d87f8ed1ffaa7f

    • SHA1

      1c5d21857b4329fee9257d8608134b2f94ea149c

    • SHA256

      590d3c67a0d4bdcfdabdc579ba3ef3e035144c7b422af7d083d30f6f53ce7cc4

    • SHA512

      3d2dfa038b24aa2e4bfdcef334fbe03679a9c56fcbc47267fb4dd4e2cdbd6906c2711c82573399ee7a91932ac5cec998b9053ffdd68ae61f8f4802d0d48c4b6e

    • SSDEEP

      6144:yw+E6shLjgYIz+X303peGbfUTpYDDmu/+3fbY:ycjgLzs0sG+pG/YY

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Dharma family

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (310) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks