Analysis
-
max time kernel
74s -
max time network
76s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09/11/2020, 08:01
Static task
static1
Behavioral task
behavioral1
Sample
8892709206b1488a8859080c914f05419d1f094148bacec1abe2f1b18a0ec7b1.bin.sample.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
8892709206b1488a8859080c914f05419d1f094148bacec1abe2f1b18a0ec7b1.bin.sample.exe
Resource
win10v20201028
General
-
Target
8892709206b1488a8859080c914f05419d1f094148bacec1abe2f1b18a0ec7b1.bin.sample.exe
-
Size
966KB
-
MD5
a70c0b2b2f978a488216909f18b9a942
-
SHA1
8529c643ccc52008504baf7b55e0d37f8081fd7a
-
SHA256
8892709206b1488a8859080c914f05419d1f094148bacec1abe2f1b18a0ec7b1
-
SHA512
4e36d64233226595a2271381b6417d2e294001d98dfe21db88adad40aca205c5c2928506955d24d132fef0ee725571b96d0f65b6a423e39e080f73846ffab5ad
Malware Config
Signatures
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\JoinMove.png.aieou 8892709206b1488a8859080c914f05419d1f094148bacec1abe2f1b18a0ec7b1.bin.sample.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.