General

  • Target

    Download (35).mp4

  • Size

    14.0MB

  • Sample

    250417-f2pf6ssrv3

  • MD5

    7f09d022359cded16c5f79858e62183d

  • SHA1

    c8c8041a68818ba5794b8fcb2fb97b5404269681

  • SHA256

    1f5859f23a8b5783f1fba87a0f87bdf26e07c13d5a273a5e9f947544d48a4b73

  • SHA512

    57b739bcb6416f83b0376d689edd6dcdb9ee6a7058f8e2cc614d4156481388afee45663de3267739fab91716aa29461078d60c7cc0d56e015de874af4ba955fa

  • SSDEEP

    393216:yTkXFbqHWUZLbzP18iBkTOTQvYKkfLH4Wo8tSiSo:y4XWWUZLbzPHTIYKkTH4Wo6b

Malware Config

Targets

    • Target

      Download (35).mp4

    • Size

      14.0MB

    • MD5

      7f09d022359cded16c5f79858e62183d

    • SHA1

      c8c8041a68818ba5794b8fcb2fb97b5404269681

    • SHA256

      1f5859f23a8b5783f1fba87a0f87bdf26e07c13d5a273a5e9f947544d48a4b73

    • SHA512

      57b739bcb6416f83b0376d689edd6dcdb9ee6a7058f8e2cc614d4156481388afee45663de3267739fab91716aa29461078d60c7cc0d56e015de874af4ba955fa

    • SSDEEP

      393216:yTkXFbqHWUZLbzP18iBkTOTQvYKkfLH4Wo8tSiSo:y4XWWUZLbzPHTIYKkTH4Wo6b

    • BadRabbit

      Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

    • Badrabbit family

    • CryptoLocker

      Ransomware family with multiple variants.

    • Cryptolocker family

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Dharma family

    • Troldesh family

    • Troldesh, Shade, Encoder.858

      Troldesh is a ransomware spread by malspam.

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Remote Service Session Hijacking: RDP Hijacking

      Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.

    • Renames multiple (828) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Blocklisted process makes network request

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Modifies Windows Firewall

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Sets service image path in registry

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Password Policy Discovery

      Attempt to access detailed information about the password policy used within an enterprise network.

    • Drops file in System32 directory

    • Hide Artifacts: Hidden Users

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks