General
-
Target
ky.bin.zip
-
Size
418KB
-
Sample
201002-mtqqh6vd1j
-
MD5
f7298ae207e762ea2c7be40ea2ac7c40
-
SHA1
3c09a95848e681d1c91c0ca024800a51d1f72a17
-
SHA256
da09eaca93ddd6728e2e137d6fee47db0644f2fe79bcc18e3bf2fe6eee55f411
-
SHA512
0cb2e38768d591664cf60f7fd13c1459f0f4bb9cd3823c3929996e1d241a30eb8360f6d6314115a978ab5471f22a5419371fa5f6c762f7002774e50ccdefcdc6
Static task
static1
Behavioral task
behavioral1
Sample
ky.bin.exe
Resource
win7
Behavioral task
behavioral2
Sample
ky.bin.exe
Resource
win10v200722
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1131729243-447456001-3632642222-1000\SYMMYWARE.TXT
Targets
-
-
Target
ky.bin
-
Size
421KB
-
MD5
80143152971ee77d14bb77c8d10346ec
-
SHA1
6c6e9ebe1e11714bd4c3584fc5b732ccfb782a05
-
SHA256
7860832a25f403c43865c00bd072fa58b2da66bc81152eec30582ad0a72932e6
-
SHA512
133f5a81542f5475597b5d2dea84af932ff49df5286a27dc9ce0dfdaa200d52f6cec8fd9f44c07e86e2585195c278874953e4dcd15a5b1a7845f704125e0c36b
Score10/10-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Modifies service
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-