General
-
Target
DCryptSoft.bin.zip
-
Size
54KB
-
Sample
200814-7d3vjpa6zn
-
MD5
ea9f108ec67164c013d7aca86c70abff
-
SHA1
9af6be92b0f72c1d375a00162f6d19612dd75351
-
SHA256
82375e3a9ac1890fa3fb693673e107e4fab53778a2d4cb9b00c4f045dd995697
-
SHA512
e115399e094745104d0560f9f4d56c22130288be4b981d79670f38325f9f8b9f8da0aa748722f9f38f5eea23afe96708423feda163a4e88074c6d962227a8053
Static task
static1
Behavioral task
behavioral1
Sample
DCryptSoft.bin.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
DCryptSoft.bin.exe
Resource
win10
Malware Config
Extracted
\??\M:\Boot\cs-CZ\Read_Me.txt
http://54fjmcwsszltlixn.onion/?QQQQQQQQ
http://helpqvrg3cc5mvb3.onion/
Extracted
\??\M:\Read_Me.txt
http://54fjmcwsszltlixn.onion/?UWXZACEF
http://helpqvrg3cc5mvb3.onion/
Targets
-
-
Target
DCryptSoft.bin
-
Size
106KB
-
MD5
8ba537f8d00a73d6cc1cc5dffa566ed1
-
SHA1
08419f52af8acc1bdac239bd65f64414597a8d96
-
SHA256
aac2024789ffd2bfce97d6a509136ecf7c43b18c2a83280b596e62d988cedb10
-
SHA512
7bc28f475d504e945d690ad998987d4184269dac8f7470842f356a50f9ff59dd1595b6cf87b2015844d7c3cf84e39f989a648700d28561251dc59428177a14f7
Score10/10-
Registers COM server for autorun
-
Modifies Installed Components in the registry
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
-
JavaScript code in executable
-
Modifies service
-