General
-
Target
-
Size
998KB
-
Sample
200706-l4mr5ga3mx
-
MD5
7bc5183b207888e9c01193fe2f1d0976
-
SHA1
e679f69eb28ab3462cc308143d9d372b40d936d1
-
SHA256
9e3d7b2163b865375d1b14a37c9130c55b9de8a6eb74b54f0d6f1a8b820eceae
-
SHA512
ce38603c3e21a716124bc4cc627f3c983685849625ec2cec5a1391eb904a84dff8681204cc3944c73e19c4398ed37fb8658927ed0f953c037afea98eea989aaf
Static task
static1
Malware Config
Targets
-
-
Target
-
Size
998KB
-
MD5
7bc5183b207888e9c01193fe2f1d0976
-
SHA1
e679f69eb28ab3462cc308143d9d372b40d936d1
-
SHA256
9e3d7b2163b865375d1b14a37c9130c55b9de8a6eb74b54f0d6f1a8b820eceae
-
SHA512
ce38603c3e21a716124bc4cc627f3c983685849625ec2cec5a1391eb904a84dff8681204cc3944c73e19c4398ed37fb8658927ed0f953c037afea98eea989aaf
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-