General
-
Target
212fda15138c362d0f7b8f5a2bf43cf8dca0030eee02f06cf2b0516325386355
-
Size
474KB
-
Sample
200831-z559jfacns
-
MD5
249baa1dbda4c346a96913ed7c17c77b
-
SHA1
e43cabc4d3968d62c22455c601885120453f226e
-
SHA256
212fda15138c362d0f7b8f5a2bf43cf8dca0030eee02f06cf2b0516325386355
-
SHA512
4436be75bdfd3e59e3ab4132250490255c97b20c937400407adb73d199b4b9658ac1389327cdfa29ce44ad5e5c417b687d0a80fdb77baf49c632fd1dbd4cc615
Static task
static1
Behavioral task
behavioral1
Sample
212fda15138c362d0f7b8f5a2bf43cf8dca0030eee02f06cf2b0516325386355.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
212fda15138c362d0f7b8f5a2bf43cf8dca0030eee02f06cf2b0516325386355.exe
Resource
win10
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\readme-warning.txt
makop
Targets
-
-
Target
212fda15138c362d0f7b8f5a2bf43cf8dca0030eee02f06cf2b0516325386355
-
Size
474KB
-
MD5
249baa1dbda4c346a96913ed7c17c77b
-
SHA1
e43cabc4d3968d62c22455c601885120453f226e
-
SHA256
212fda15138c362d0f7b8f5a2bf43cf8dca0030eee02f06cf2b0516325386355
-
SHA512
4436be75bdfd3e59e3ab4132250490255c97b20c937400407adb73d199b4b9658ac1389327cdfa29ce44ad5e5c417b687d0a80fdb77baf49c632fd1dbd4cc615
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Deletes system backup catalog
Ransomware often tries to delete backup files to inhibit system recovery.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Modifies service
-
Suspicious use of SetThreadContext
-