General
-
Target
Python Ransom BlackKingdom
-
Size
9.8MB
-
Sample
200915-4fbtlez4fx
-
MD5
98c14f48c1ae5cbbf6ff5403336e07c3
-
SHA1
d4b101f66a40114d3d1075d7c3a59cbbd47c707d
-
SHA256
8dc94d486fd546ffbf8f21252aba65efe18432a6cae815e02b8be4ce4449291a
-
SHA512
e9e88e5843fea3f0fcb2e446674b3414e2e2a6be478fb9325a2d623b50f9de009cbc0a768a2572b51de637bedf1f83f3dccf5996b1396f8a736215bfccbb310e
Static task
static1
Behavioral task
behavioral1
Sample
Python Ransom BlackKingdom.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
Python Ransom BlackKingdom.exe
Resource
win10
Malware Config
Extracted
C:\Users\Admin\Downloads\README.txt
demonware
Targets
-
-
Target
Python Ransom BlackKingdom
-
Size
9.8MB
-
MD5
98c14f48c1ae5cbbf6ff5403336e07c3
-
SHA1
d4b101f66a40114d3d1075d7c3a59cbbd47c707d
-
SHA256
8dc94d486fd546ffbf8f21252aba65efe18432a6cae815e02b8be4ce4449291a
-
SHA512
e9e88e5843fea3f0fcb2e446674b3414e2e2a6be478fb9325a2d623b50f9de009cbc0a768a2572b51de637bedf1f83f3dccf5996b1396f8a736215bfccbb310e
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Loads dropped DLL
-
JavaScript code in executable
-