General
-
Target
Download (35).mp4
-
Size
14.0MB
-
Sample
250417-f2pf6ssrv3
-
MD5
7f09d022359cded16c5f79858e62183d
-
SHA1
c8c8041a68818ba5794b8fcb2fb97b5404269681
-
SHA256
1f5859f23a8b5783f1fba87a0f87bdf26e07c13d5a273a5e9f947544d48a4b73
-
SHA512
57b739bcb6416f83b0376d689edd6dcdb9ee6a7058f8e2cc614d4156481388afee45663de3267739fab91716aa29461078d60c7cc0d56e015de874af4ba955fa
-
SSDEEP
393216:yTkXFbqHWUZLbzP18iBkTOTQvYKkfLH4Wo8tSiSo:y4XWWUZLbzPHTIYKkTH4Wo6b
Static task
static1
Behavioral task
behavioral1
Sample
Download (35).mp4
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
Download (35).mp4
Resource
win11-20250411-en
Behavioral task
behavioral3
Sample
Download (35).mp4
Resource
ubuntu2204-amd64-20250307-en
Behavioral task
behavioral4
Sample
Download (35).mp4
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral5
Sample
Download (35).mp4
Resource
debian9-mipsbe-20250410-en
Behavioral task
behavioral6
Sample
Download (35).mp4
Resource
debian9-mipsel-20240418-en
Malware Config
Targets
-
-
Target
Download (35).mp4
-
Size
14.0MB
-
MD5
7f09d022359cded16c5f79858e62183d
-
SHA1
c8c8041a68818ba5794b8fcb2fb97b5404269681
-
SHA256
1f5859f23a8b5783f1fba87a0f87bdf26e07c13d5a273a5e9f947544d48a4b73
-
SHA512
57b739bcb6416f83b0376d689edd6dcdb9ee6a7058f8e2cc614d4156481388afee45663de3267739fab91716aa29461078d60c7cc0d56e015de874af4ba955fa
-
SSDEEP
393216:yTkXFbqHWUZLbzP18iBkTOTQvYKkfLH4Wo8tSiSo:y4XWWUZLbzPHTIYKkTH4Wo6b
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
Badrabbit family
-
Cryptolocker family
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Troldesh family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Remote Service Session Hijacking: RDP Hijacking
Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.
-
Renames multiple (828) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Password Policy Discovery
Attempt to access detailed information about the password policy used within an enterprise network.
-
Drops file in System32 directory
-
Hide Artifacts: Hidden Users
-
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1JavaScript
1Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Account Manipulation
1Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1Hide Artifacts
3Hidden Files and Directories
2Hidden Users
1Impair Defenses
2Disable or Modify System Firewall
1Safe Mode Boot
1Indicator Removal
2File Deletion
2Modify Registry
4Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Password Policy Discovery
1Peripheral Device Discovery
2Permission Groups Discovery
1Local Groups
1Query Registry
5System Information Discovery
5System Location Discovery
1System Language Discovery
1