General

  • Target

    Verdacrypt#232.ps1

  • Size

    34KB

  • Sample

    250330-vlgtqasyc1

  • MD5

    bfb119ecc5767fce155199d439d2ef6a

  • SHA1

    206a16a8cd984bc227baf921cc8d3da6032e6a4f

  • SHA256

    1e6a72c58db5d7224f81cd51b0e2b591b3469c838d2e1bc64d06d64a666657fd

  • SHA512

    806cd232681dcf54f46e3012ec85133417263a590640faada18cf38162eacd6b729d0dc7a254a7378d1820d3198227ebda739191f4c0ce0a17e64b3c23b27ba2

  • SSDEEP

    384:tqz/sIUBSzj5mMEEpi0D04eEMls/11AUfoUHadPw3+4CFYw5jICfyQY:1M5mME00xEbrl6Bq+409I9QY

Malware Config

Targets

    • Target

      Verdacrypt#232.ps1

    • Size

      34KB

    • MD5

      bfb119ecc5767fce155199d439d2ef6a

    • SHA1

      206a16a8cd984bc227baf921cc8d3da6032e6a4f

    • SHA256

      1e6a72c58db5d7224f81cd51b0e2b591b3469c838d2e1bc64d06d64a666657fd

    • SHA512

      806cd232681dcf54f46e3012ec85133417263a590640faada18cf38162eacd6b729d0dc7a254a7378d1820d3198227ebda739191f4c0ce0a17e64b3c23b27ba2

    • SSDEEP

      384:tqz/sIUBSzj5mMEEpi0D04eEMls/11AUfoUHadPw3+4CFYw5jICfyQY:1M5mME00xEbrl6Bq+409I9QY

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Modifies WinLogon for persistence

    • Clears Windows event logs

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Blocklisted process makes network request

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Adds Run key to start application

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.