General
-
Target
ee7221f0d74d03a613ca334aa6cacbcff381a10a1d0ded8a485c3ad1ba8530e1.exe
-
Size
211KB
-
Sample
200427-p72xe61yr6
-
MD5
32ed52d918a138ddad24dd3a84e20e56
-
SHA1
11f455b32e8473353febc5995cef63497c5404a1
-
SHA256
ee7221f0d74d03a613ca334aa6cacbcff381a10a1d0ded8a485c3ad1ba8530e1
-
SHA512
13e49bb04813598ef5ab1e40a0a657091182bf8ec7b9d4a24bb6d162bfc01b232c910e6e85fdefc13dcded49438e5e6d996ca21a13ec2cd7a0d5f5a40c16a446
Static task
static1
Behavioral task
behavioral1
Sample
ee7221f0d74d03a613ca334aa6cacbcff381a10a1d0ded8a485c3ad1ba8530e1.exe
Resource
win7v200410
Behavioral task
behavioral2
Sample
ee7221f0d74d03a613ca334aa6cacbcff381a10a1d0ded8a485c3ad1ba8530e1.exe
Resource
win10v200410
Malware Config
Extracted
C:\How_To_Decrypt_My_Files.txt
ragnarok
Extracted
C:\How_To_Decrypt_My_Files.txt
ragnarok
Extracted
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\LocalState\ContentManagementSDK\Creatives\296333\How_To_Decrypt_My_Files.txt
ragnarok
Targets
-
-
Target
ee7221f0d74d03a613ca334aa6cacbcff381a10a1d0ded8a485c3ad1ba8530e1.exe
-
Size
211KB
-
MD5
32ed52d918a138ddad24dd3a84e20e56
-
SHA1
11f455b32e8473353febc5995cef63497c5404a1
-
SHA256
ee7221f0d74d03a613ca334aa6cacbcff381a10a1d0ded8a485c3ad1ba8530e1
-
SHA512
13e49bb04813598ef5ab1e40a0a657091182bf8ec7b9d4a24bb6d162bfc01b232c910e6e85fdefc13dcded49438e5e6d996ca21a13ec2cd7a0d5f5a40c16a446
Score10/10-
Ragnarok
Ransomware family deployed from Citrix servers infected via CVE-2019-19781.
-
Modifies boot configuration data using bcdedit
-
Modifies Windows Firewall
-
Drops desktop.ini file(s)
-
Modifies service
-