General
-
Target
1.exe
-
Size
219KB
-
Sample
200708-wbnr9hy6p6
-
MD5
7e6a1a7b83ebc2ae8445e9421d18fc8d
-
SHA1
69ea7bfdf164afb80e68643722e687f35ac87cdc
-
SHA256
4aa3ae979ad5fb790408c90ebe653592f5861eb7b8dac54cad59e9ac1c54bac4
-
SHA512
fbc5d8b1cfb8d875108cf729d0f59e55f4f729884237f1aca001ec5b937748695c27fe283806d58c11a1874dac88003fb2369226878455b4f5e5ca96fe1b2d23
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v200430
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\readme-warning.txt
makop
Targets
-
-
Target
1.exe
-
Size
219KB
-
MD5
7e6a1a7b83ebc2ae8445e9421d18fc8d
-
SHA1
69ea7bfdf164afb80e68643722e687f35ac87cdc
-
SHA256
4aa3ae979ad5fb790408c90ebe653592f5861eb7b8dac54cad59e9ac1c54bac4
-
SHA512
fbc5d8b1cfb8d875108cf729d0f59e55f4f729884237f1aca001ec5b937748695c27fe283806d58c11a1874dac88003fb2369226878455b4f5e5ca96fe1b2d23
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Deletes system backup catalog
Ransomware often tries to delete backup files to inhibit system recovery.
-
Modifies Installed Components in the registry
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run entry to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Modifies service
-