General
-
Target
ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe
-
Size
34KB
-
Sample
200428-dks1cfanje
-
MD5
eaf04bb5f9fff5b07b81bede9a3ea549
-
SHA1
62d1c4da546502605c23d01d050bb63cf4c18022
-
SHA256
ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237
-
SHA512
140407b691d73daab459003b7402af252c648756ea2f1cbc785fd9ec64c2432b0d0588f97c2beef629914998d7f78698a03aa0beab914bd0f7baba15fb5571d6
Static task
static1
Behavioral task
behavioral1
Sample
ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe
Resource
win7v200410
Behavioral task
behavioral2
Sample
ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe
Resource
win10v200410
Malware Config
Extracted
C:\readme-warning.txt
makop
Targets
-
-
Target
ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237.exe
-
Size
34KB
-
MD5
eaf04bb5f9fff5b07b81bede9a3ea549
-
SHA1
62d1c4da546502605c23d01d050bb63cf4c18022
-
SHA256
ca02ecab5b5c652ade36462b319f3cf592c4ca83eec9f5f73e7db81cf8061237
-
SHA512
140407b691d73daab459003b7402af252c648756ea2f1cbc785fd9ec64c2432b0d0588f97c2beef629914998d7f78698a03aa0beab914bd0f7baba15fb5571d6
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies boot configuration data using bcdedit
-
Modifies Installed Components in the registry
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-