General
-
Target
84c88686a52f325a239aec45635ec9adc85bfabcb9888658eecbca1bd9757a7b.exe
-
Size
34KB
-
Sample
200420-k5a1rczmbj
-
MD5
fcf5c8e8a180c66e15ea22128dd0adfb
-
SHA1
d4f0c114ffe12e343739fb837d24dc31dfab985c
-
SHA256
84c88686a52f325a239aec45635ec9adc85bfabcb9888658eecbca1bd9757a7b
-
SHA512
f06645c73bfc87061c4561b8cacb6c782493e5d39cd29971d71b0c38578296b81f9c2b54ca0415e15e5fd49755b7fa612f244b9e68fe8f21fc9db60c5f89b2e9
Static task
static1
Behavioral task
behavioral1
Sample
84c88686a52f325a239aec45635ec9adc85bfabcb9888658eecbca1bd9757a7b.exe
Resource
win7v200410
Behavioral task
behavioral2
Sample
84c88686a52f325a239aec45635ec9adc85bfabcb9888658eecbca1bd9757a7b.exe
Resource
win10v200410
Malware Config
Targets
-
-
Target
84c88686a52f325a239aec45635ec9adc85bfabcb9888658eecbca1bd9757a7b.exe
-
Size
34KB
-
MD5
fcf5c8e8a180c66e15ea22128dd0adfb
-
SHA1
d4f0c114ffe12e343739fb837d24dc31dfab985c
-
SHA256
84c88686a52f325a239aec45635ec9adc85bfabcb9888658eecbca1bd9757a7b
-
SHA512
f06645c73bfc87061c4561b8cacb6c782493e5d39cd29971d71b0c38578296b81f9c2b54ca0415e15e5fd49755b7fa612f244b9e68fe8f21fc9db60c5f89b2e9
Score10/10-
T1Happy
T1Happy ransomware is a cryptovirus that behaves different than its counterparts.
-
Drops startup file
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run entry to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-