General
-
Target
95f8679a25052b90f6a22b3d95b157a6e28d6be2.zip
-
Size
195KB
-
Sample
201009-ae8mzvd52n
-
MD5
eae9fc8a34ab6df5bd358701cc0f7c91
-
SHA1
b497be92eea2e1c9094410afaa4b6360ebe1fa28
-
SHA256
b4d30ef10b6ba305268792b7c1bd1b287d4aed6aa607fcd631196c0faf86dc09
-
SHA512
f28fbd73ec956168eecf4ab0478becce1b42a06fb28550e906a79d954b7491882678c339bbb23aa14392c9cb3deb9545aeb6858f6f42933152d08ba3c5fd7fd3
Static task
static1
Behavioral task
behavioral1
Sample
clop.bin.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
clop.bin.exe
Resource
win10v200722
Malware Config
Extracted
C:\ClopReadMe.txt
clop
Targets
-
-
Target
clop.bin
-
Size
100KB
-
MD5
8752a7a052ba75239b86b0da1d483dd7
-
SHA1
6eeef883d209d02a05ae9e6a2f37c6cbf69f4d89
-
SHA256
3320f11728458d01eef62e10e48897ec1c2277c1fe1aa2d471a16b4dccfc1207
-
SHA512
57d19e9254ecaeaf301e11598c88b1440f3f85baf0cb8d7a0ac952cd6d63f565df9809b13f50a059302bfb0f81a5c498e49837e2e9480ec9b51c14a409fbdb65
Score10/10-
Clop
Ransomware discovered in early 2019 which has been actively developed since release.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-