General

  • Target

    HEUR-Trojan-Ransom.Win32.Generic-150200c3b5cd1afd87110cc2ce0002bc3bb1590cf91bbc17e2ade2824e38d0cc.7z

  • Size

    1.3MB

  • Sample

    250315-vtpjjaywbv

  • MD5

    98e7aa73bc953854d53454484e26ca0c

  • SHA1

    2e842b7293158af9b62c8a8f8200ac2113a57601

  • SHA256

    d83723f572e06c97ba7b1d51ca8c63b95d633cef13c426abdb2d4782b36ab339

  • SHA512

    7c62887161b8921c14c928b1ccad3a76d785c827b45143e708d50fe74e6bbe0bf01f3ac162a3261b3272f1bd9c5a4ae8adb0b50e8877a61e4601aa123efbb958

  • SSDEEP

    24576:FkGHJ+rZRWGcmOoyOk7fhQQfugQbhtTynAJXCvPBBLGwCv2mIJOHc03uKKYCtLqV:FtHJAQvmryZ7fhlabyLnBBLiv2mIJ8c4

Malware Config

Targets

    • Target

      HEUR-Trojan-Ransom.Win32.Generic-150200c3b5cd1afd87110cc2ce0002bc3bb1590cf91bbc17e2ade2824e38d0cc.7z

    • Size

      1.3MB

    • MD5

      98e7aa73bc953854d53454484e26ca0c

    • SHA1

      2e842b7293158af9b62c8a8f8200ac2113a57601

    • SHA256

      d83723f572e06c97ba7b1d51ca8c63b95d633cef13c426abdb2d4782b36ab339

    • SHA512

      7c62887161b8921c14c928b1ccad3a76d785c827b45143e708d50fe74e6bbe0bf01f3ac162a3261b3272f1bd9c5a4ae8adb0b50e8877a61e4601aa123efbb958

    • SSDEEP

      24576:FkGHJ+rZRWGcmOoyOk7fhQQfugQbhtTynAJXCvPBBLGwCv2mIJOHc03uKKYCtLqV:FtHJAQvmryZ7fhlabyLnBBLiv2mIJ8c4

    • Ouroboros family

    • Ouroboros/Zeropadypt

      Ransomware family based on open-source CryptoWire.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops desktop.ini file(s)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks