General

  • Target

    Arata_Verdacrypt.ps1

  • Size

    34KB

  • Sample

    250328-yq2lgasms4

  • MD5

    470f24b0d1fcbfaae2ba8286ab64f0f2

  • SHA1

    cefe5f8886ed2468f7834c5ed0abafbee7083245

  • SHA256

    e04ca52275d940234c4cf1744c64712513319668dbf7a0d77111a03cf9fdba40

  • SHA512

    e108433b636de0454ff3cdb4822be12b84950e5cf32f63ded0b2d2d532f570357156e15aacd7a8b95aabcd7f4280609e1fcde32146883ab866e1d65600768715

  • SSDEEP

    384:thz/snUBSzj5mMEEpi0D04eEMls/11AUfoUHaWPw3+4CFYV5jIyJu7Y:NM5mME00xEbrl6Yq+40+IF7Y

Malware Config

Targets

    • Target

      Arata_Verdacrypt.ps1

    • Size

      34KB

    • MD5

      470f24b0d1fcbfaae2ba8286ab64f0f2

    • SHA1

      cefe5f8886ed2468f7834c5ed0abafbee7083245

    • SHA256

      e04ca52275d940234c4cf1744c64712513319668dbf7a0d77111a03cf9fdba40

    • SHA512

      e108433b636de0454ff3cdb4822be12b84950e5cf32f63ded0b2d2d532f570357156e15aacd7a8b95aabcd7f4280609e1fcde32146883ab866e1d65600768715

    • SSDEEP

      384:thz/snUBSzj5mMEEpi0D04eEMls/11AUfoUHaWPw3+4CFYV5jIyJu7Y:NM5mME00xEbrl6Yq+40+IF7Y

    • Clears Windows event logs

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

MITRE ATT&CK Enterprise v15

Tasks