General
-
Target
e4a43f0bb8216496b95826c2c1aeb2f3ece6a7d87a8dbc7a0cc6a3935ace3d90.bin
-
Size
92KB
-
Sample
201016-98v8vsf7ma
-
MD5
98db57569da8c50de68fb69002c069cb
-
SHA1
5adf28157d29aae9e0ff25013c0ca084d3fe30c9
-
SHA256
e4a43f0bb8216496b95826c2c1aeb2f3ece6a7d87a8dbc7a0cc6a3935ace3d90
-
SHA512
bbcb7051ec432c67b9920e727660d1867bf5067b6a98a2feaaf53d7be6c54aeab68082a27bd7747560a456afd72508d1a35500022d04de7da20e8bdc20ce1ff7
Static task
static1
Behavioral task
behavioral1
Sample
e4a43f0bb8216496b95826c2c1aeb2f3ece6a7d87a8dbc7a0cc6a3935ace3d90.bin.exe
Resource
win7
Behavioral task
behavioral2
Sample
e4a43f0bb8216496b95826c2c1aeb2f3ece6a7d87a8dbc7a0cc6a3935ace3d90.bin.exe
Resource
win10v200722
Malware Config
Extracted
C:\Users\Admin\Desktop\FILES ENCRYPTED.txt
decrypttme@airmail.cc
decryptttme@protonmail.com
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
decrypttme@airmail.cc
decryptttme@protonmail.com
Targets
-
-
Target
e4a43f0bb8216496b95826c2c1aeb2f3ece6a7d87a8dbc7a0cc6a3935ace3d90.bin
-
Size
92KB
-
MD5
98db57569da8c50de68fb69002c069cb
-
SHA1
5adf28157d29aae9e0ff25013c0ca084d3fe30c9
-
SHA256
e4a43f0bb8216496b95826c2c1aeb2f3ece6a7d87a8dbc7a0cc6a3935ace3d90
-
SHA512
bbcb7051ec432c67b9920e727660d1867bf5067b6a98a2feaaf53d7be6c54aeab68082a27bd7747560a456afd72508d1a35500022d04de7da20e8bdc20ce1ff7
Score10/10-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Modifies service
-