General
-
Target
Client-17.exe
-
Size
60KB
-
Sample
200510-rylqg3s5bx
-
MD5
0f27d1180d28e1bcaf4d66f6b51c087c
-
SHA1
15a00d3aba362aade900374b6d159de98e8eac62
-
SHA256
34b93f1989b272866f023c34a2243978565fcfd23869cacc58ce592c1c545d8e
-
SHA512
7a6f8f1f55fbd37124fdf24ce057f8cb2231ecc2fc4cf9d9028ab83436e64ae59af97a5e4ec1e6587ebcdfe6487f6794450ba961429afba0b24bd6fb48237ea8
Static task
static1
Behavioral task
behavioral1
Sample
Client-17.exe
Resource
win7v200430
Malware Config
Extracted
C:\Users\Admin\Desktop\HELP_ME_MY_FILES_NOT_MAKE_PUBLIC.txt
hakbit
bc1q5dn3tc67wh90mrq65xm8a2z9lr9t0tc2lctwv3
Extracted
Protocol: ftp- Host:
199.188.200.253 - Port:
21 - Username:
[email protected] - Password:
13MelisaLening37
Targets
-
-
Target
Client-17.exe
-
Size
60KB
-
MD5
0f27d1180d28e1bcaf4d66f6b51c087c
-
SHA1
15a00d3aba362aade900374b6d159de98e8eac62
-
SHA256
34b93f1989b272866f023c34a2243978565fcfd23869cacc58ce592c1c545d8e
-
SHA512
7a6f8f1f55fbd37124fdf24ce057f8cb2231ecc2fc4cf9d9028ab83436e64ae59af97a5e4ec1e6587ebcdfe6487f6794450ba961429afba0b24bd6fb48237ea8
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-