Category | Details | References |
---|---|---|
Actors | ||
First Observed | Summer 2021 | 1 |
Threat Actors | ||
Environment | ||
Platforms | Windows and Linux(ESXi) | 2 |
Artifacts | ||
Extensions | .v-society.XXX-XXX-XXX | 3 |
Ransomware Notes | !!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT | 1 |
Services it Disables | Not automated, but have been observed disabling PowerShell logging, Bypassing AMSI protection for PowerShell | 4 |
Other Observables | Modify System Process, Registry Run Keys/Startup Folder, DLL Side-Loading, Scheduled Task/Job | 2 |
Automation | ||
Automatically Gains Access | No. Typically gain access through compromised credentials by exploiting internet-facing applications) | 2 |
Automatically Escalates Privileges | Yes (through PrintNightmare vulnerability) | 1 |
Requires Human Interaction | Yes | 2 |
Automatic Exfiltration | No. Have been seen exfiltrating sensitive information over SMB (TCP/445) directly from a compromised domain controller | 4 |
Automatic Propagation | No. Can deliver payloads to shared location | 4 |
Please note, this page was last updated at 2023-03-14 20:21.