General
-
Target
a6f33427a356dca0420466bcc3283592e87caf4c8224c7d50819f69c71edd461.exe
-
Size
994KB
-
Sample
200911-3wb7tfrw2j
-
MD5
62ae12ef05bb6ad38cf30d8c35efd416
-
SHA1
90049acd442225de16124a89835eed61f4202a8b
-
SHA256
a6f33427a356dca0420466bcc3283592e87caf4c8224c7d50819f69c71edd461
-
SHA512
0114ca7c03291783732a2cbcbbbc4f6a2250c3ad41aaa415be6e85aa28daad85b668f4f0177357c3fdf1c861830bb8b24d378390de7736a57660182ac3c3709a
Static task
static1
Behavioral task
behavioral1
Sample
a6f33427a356dca0420466bcc3283592e87caf4c8224c7d50819f69c71edd461.exe
Resource
win7
Behavioral task
behavioral2
Sample
a6f33427a356dca0420466bcc3283592e87caf4c8224c7d50819f69c71edd461.exe
Resource
win10v200722
Malware Config
Targets
-
-
Target
a6f33427a356dca0420466bcc3283592e87caf4c8224c7d50819f69c71edd461.exe
-
Size
994KB
-
MD5
62ae12ef05bb6ad38cf30d8c35efd416
-
SHA1
90049acd442225de16124a89835eed61f4202a8b
-
SHA256
a6f33427a356dca0420466bcc3283592e87caf4c8224c7d50819f69c71edd461
-
SHA512
0114ca7c03291783732a2cbcbbbc4f6a2250c3ad41aaa415be6e85aa28daad85b668f4f0177357c3fdf1c861830bb8b24d378390de7736a57660182ac3c3709a
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-