Analysis

  • max time kernel
    123s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    13/07/2020, 14:01

General

  • Target

    bd5ebf9632ad17e9a39393ab94ef055307ec053486fe703e2a614de391bc4a65.exe

  • Size

    4.6MB

  • MD5

    483b85e49e1b8c04b0e5414d7db80208

  • SHA1

    af430762aea6c3769d0ebedfd553cf22e0f223ac

  • SHA256

    bd5ebf9632ad17e9a39393ab94ef055307ec053486fe703e2a614de391bc4a65

  • SHA512

    3d9b5c2b2c045e0c0d50e053492c18677bfaf958e92a709ec89516624d0b308b8509c308a13626e18acf535dfd648260046000cedca2b00f303e874755145a66

Malware Config

Extracted

Path

C:\Boot\Fonts\HOW TO RESTORE YOUR FILES.TXT

Ransom Note
Hello! All your files are encrypted and only we can decrypt them. Contact us: [email protected] or [email protected] Write us if you want to return your files - we can do it very quickly! The header of letter must contain extension of encrypted files. We always reply within 24 hours. If not - check spam folder, resend your letter or try send letter from another email service (like protonmail.com). Attention! Do not rename or edit encrypted files: you may have permanent data loss. To prove that we can recover your files, we am ready to decrypt any three files (less than 1Mb) for free (except databases, Excel and backups). HURRY UP! If you do not email us in the next 48 hours then your data may be lost permanently.

Signatures

  • Drops startup file 2 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies service 2 TTPs 5 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Drops file in Program Files directory 25655 IoCs