General

  • Target

    Spragmos.ps1

  • Size

    34KB

  • Sample

    250330-wj28bawkx3

  • MD5

    1ff55d58db5098bc348b64c56f7e5275

  • SHA1

    042a98b432daff9e99a5af37e748b4b2d66ee763

  • SHA256

    bbcfe2f3c7c1253bc2fea8f858cf887b36c363ed90a3160b6cf19ee2b5a9acbd

  • SHA512

    8e7a5dc1d9d642e0370f778efc57e378bf29d4140414fe5f4ce85345202e6e5cd397aeab1376ab3887da1abce5d72ca2b4b7fe4a35afb1637ffbd890435b0f58

  • SSDEEP

    384:tqz/spUBSzj5mMEEpi0D04eEMls/11AUfoUHadPw3+4CFYw5jICfyQY:kM5mME00xEbrl6Bq+409I9QY

Malware Config

Targets

    • Target

      Spragmos.ps1

    • Size

      34KB

    • MD5

      1ff55d58db5098bc348b64c56f7e5275

    • SHA1

      042a98b432daff9e99a5af37e748b4b2d66ee763

    • SHA256

      bbcfe2f3c7c1253bc2fea8f858cf887b36c363ed90a3160b6cf19ee2b5a9acbd

    • SHA512

      8e7a5dc1d9d642e0370f778efc57e378bf29d4140414fe5f4ce85345202e6e5cd397aeab1376ab3887da1abce5d72ca2b4b7fe4a35afb1637ffbd890435b0f58

    • SSDEEP

      384:tqz/spUBSzj5mMEEpi0D04eEMls/11AUfoUHadPw3+4CFYw5jICfyQY:kM5mME00xEbrl6Bq+409I9QY

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Modifies WinLogon for persistence

    • Clears Windows event logs

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Adds Run key to start application

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks