General
-
Target
mkp.exe
-
Size
1.2MB
-
Sample
200730-48mxz512fa
-
MD5
2055bbde7b5a1afd6ea79974d1435a98
-
SHA1
e249c4f1d0910cb4660a3d41593692a02796472f
-
SHA256
e51abdb2023b560244802f7d9687944dc0dff3042c28d7bc7a2b517df6e24942
-
SHA512
f21f963ea6f3c394f61780825a0971f432450a7ca94353db0ba5915a0e190f0d65025c40756597b0170a3c23fb160e27011ce4a098afe2a518efc47a06874d55
Static task
static1
Behavioral task
behavioral1
Sample
mkp.exe
Resource
win7
Behavioral task
behavioral2
Sample
mkp.exe
Resource
win10v200722
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\readme-warning.txt
makop
Targets
-
-
Target
mkp.exe
-
Size
1.2MB
-
MD5
2055bbde7b5a1afd6ea79974d1435a98
-
SHA1
e249c4f1d0910cb4660a3d41593692a02796472f
-
SHA256
e51abdb2023b560244802f7d9687944dc0dff3042c28d7bc7a2b517df6e24942
-
SHA512
f21f963ea6f3c394f61780825a0971f432450a7ca94353db0ba5915a0e190f0d65025c40756597b0170a3c23fb160e27011ce4a098afe2a518efc47a06874d55
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Deletes system backup catalog
Ransomware often tries to delete backup files to inhibit system recovery.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Modifies service
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-