General

  • Target

    VerdacryptorV5.ps1

  • Size

    34KB

  • Sample

    250328-yt6plaz1gw

  • MD5

    264c23138c8fa42c5349b813eaceadef

  • SHA1

    9b6775c974c762e3623e5a4d6a5889abb4c5483d

  • SHA256

    0d04aa56dc4d408adec27419813e9ab81841a0df73fc8a27844eb930ca7b7d19

  • SHA512

    4738506caa97ca0b07fc929abef76d8f1e9ef13139701101985457763a7cc5d13536f336879f2cab966618f55aa451768be646e04a98876a0ea2d8476384dbb6

  • SSDEEP

    384:thz/s2UBSzj5mMEEpi0D04eEMls/11AUfoUHaWPw3+4CFYw5jIyJyXY:EM5mME00xEbrl6Yq+409IrXY

Malware Config

Targets

    • Target

      VerdacryptorV5.ps1

    • Size

      34KB

    • MD5

      264c23138c8fa42c5349b813eaceadef

    • SHA1

      9b6775c974c762e3623e5a4d6a5889abb4c5483d

    • SHA256

      0d04aa56dc4d408adec27419813e9ab81841a0df73fc8a27844eb930ca7b7d19

    • SHA512

      4738506caa97ca0b07fc929abef76d8f1e9ef13139701101985457763a7cc5d13536f336879f2cab966618f55aa451768be646e04a98876a0ea2d8476384dbb6

    • SSDEEP

      384:thz/s2UBSzj5mMEEpi0D04eEMls/11AUfoUHaWPw3+4CFYw5jIyJyXY:EM5mME00xEbrl6Yq+409IrXY

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Modifies WinLogon for persistence

    • Clears Windows event logs

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Adds Run key to start application

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks