General

  • Target

    Verdacrypt#232.ps1

  • Size

    34KB

  • Sample

    250330-vlgtqasyc1

  • MD5

    bfb119ecc5767fce155199d439d2ef6a

  • SHA1

    206a16a8cd984bc227baf921cc8d3da6032e6a4f

  • SHA256

    1e6a72c58db5d7224f81cd51b0e2b591b3469c838d2e1bc64d06d64a666657fd

  • SHA512

    806cd232681dcf54f46e3012ec85133417263a590640faada18cf38162eacd6b729d0dc7a254a7378d1820d3198227ebda739191f4c0ce0a17e64b3c23b27ba2

  • SSDEEP

    384:tqz/sIUBSzj5mMEEpi0D04eEMls/11AUfoUHadPw3+4CFYw5jICfyQY:1M5mME00xEbrl6Bq+409I9QY

Malware Config

Targets

    • Target

      Verdacrypt#232.ps1

    • Size

      34KB

    • MD5

      bfb119ecc5767fce155199d439d2ef6a

    • SHA1

      206a16a8cd984bc227baf921cc8d3da6032e6a4f

    • SHA256

      1e6a72c58db5d7224f81cd51b0e2b591b3469c838d2e1bc64d06d64a666657fd

    • SHA512

      806cd232681dcf54f46e3012ec85133417263a590640faada18cf38162eacd6b729d0dc7a254a7378d1820d3198227ebda739191f4c0ce0a17e64b3c23b27ba2

    • SSDEEP

      384:tqz/sIUBSzj5mMEEpi0D04eEMls/11AUfoUHadPw3+4CFYw5jICfyQY:1M5mME00xEbrl6Bq+409I9QY

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Modifies WinLogon for persistence

    • Clears Windows event logs

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Blocklisted process makes network request

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Adds Run key to start application

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks