General
-
Target
Client-17.exe
-
Size
60KB
-
Sample
200510-rylqg3s5bx
-
MD5
0f27d1180d28e1bcaf4d66f6b51c087c
-
SHA1
15a00d3aba362aade900374b6d159de98e8eac62
-
SHA256
34b93f1989b272866f023c34a2243978565fcfd23869cacc58ce592c1c545d8e
-
SHA512
7a6f8f1f55fbd37124fdf24ce057f8cb2231ecc2fc4cf9d9028ab83436e64ae59af97a5e4ec1e6587ebcdfe6487f6794450ba961429afba0b24bd6fb48237ea8
Static task
static1
Behavioral task
behavioral1
Sample
Client-17.exe
Resource
win7v200430
Malware Config
Extracted
C:\Users\Admin\Desktop\HELP_ME_MY_FILES_NOT_MAKE_PUBLIC.txt
hakbit
timepay@protonmail.com
bc1q5dn3tc67wh90mrq65xm8a2z9lr9t0tc2lctwv3
Extracted
Protocol: ftp- Host:
199.188.200.253 - Port:
21 - Username:
9b732058@noether-stiftung.de - Password:
13MelisaLening37
Targets
-
-
Target
Client-17.exe
-
Size
60KB
-
MD5
0f27d1180d28e1bcaf4d66f6b51c087c
-
SHA1
15a00d3aba362aade900374b6d159de98e8eac62
-
SHA256
34b93f1989b272866f023c34a2243978565fcfd23869cacc58ce592c1c545d8e
-
SHA512
7a6f8f1f55fbd37124fdf24ce057f8cb2231ecc2fc4cf9d9028ab83436e64ae59af97a5e4ec1e6587ebcdfe6487f6794450ba961429afba0b24bd6fb48237ea8
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Matrix
Collection
Data from Local System
1Command and Control
Credential Access
Credentials in Files
1Discovery
Query Registry
1System Information Discovery
2Peripheral Device Discovery
1Execution
Exfiltration
Initial Access
Lateral Movement
Persistence
Privilege Escalation