General
-
Target
05370c_payload.exe
-
Size
92KB
-
Sample
200624-rnyn8k64f6
-
MD5
1fc77fab14d6e5b21a74d7f8cf7e819b
-
SHA1
32668c092805effd45e04a3494e8fd6eb409b7e0
-
SHA256
7c8af5c827a16b0a6c495da965e2f2089116f0c449dee2ccfce951636d0591a8
-
SHA512
542edf258415dd699639dba57bd23f3796acdadf9a81f41ace88406bcfd1998c5ccfcc0dd1e70f8dbed4f4bade66bca52bb5089d73bc967677c56ed8c2046538
Static task
static1
Behavioral task
behavioral1
Sample
05370c_payload.exe
Resource
win7
Behavioral task
behavioral2
Sample
05370c_payload.exe
Resource
win10v200430
Malware Config
Extracted
C:\Users\Admin\Desktop\FILES ENCRYPTED.txt
Targets
-
-
Target
05370c_payload.exe
-
Size
92KB
-
MD5
1fc77fab14d6e5b21a74d7f8cf7e819b
-
SHA1
32668c092805effd45e04a3494e8fd6eb409b7e0
-
SHA256
7c8af5c827a16b0a6c495da965e2f2089116f0c449dee2ccfce951636d0591a8
-
SHA512
542edf258415dd699639dba57bd23f3796acdadf9a81f41ace88406bcfd1998c5ccfcc0dd1e70f8dbed4f4bade66bca52bb5089d73bc967677c56ed8c2046538
Score10/10-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Drops startup file
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run entry to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Modifies service
-