Analysis
-
max time kernel
12s -
max time network
118s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09/11/2020, 08:05
Static task
static1
Behavioral task
behavioral1
Sample
8892709206b1488a8859080c914f05419d1f094148bacec1abe2f1b18a0ec7b1.bin.sample.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
8892709206b1488a8859080c914f05419d1f094148bacec1abe2f1b18a0ec7b1.bin.sample.exe
Resource
win10v20201028
General
-
Target
8892709206b1488a8859080c914f05419d1f094148bacec1abe2f1b18a0ec7b1.bin.sample.exe
-
Size
966KB
-
MD5
a70c0b2b2f978a488216909f18b9a942
-
SHA1
8529c643ccc52008504baf7b55e0d37f8081fd7a
-
SHA256
8892709206b1488a8859080c914f05419d1f094148bacec1abe2f1b18a0ec7b1
-
SHA512
4e36d64233226595a2271381b6417d2e294001d98dfe21db88adad40aca205c5c2928506955d24d132fef0ee725571b96d0f65b6a423e39e080f73846ffab5ad
Malware Config
Signatures
-
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\MountDisable.png.aieou 8892709206b1488a8859080c914f05419d1f094148bacec1abe2f1b18a0ec7b1.bin.sample.exe File created C:\Users\Admin\Pictures\ResizeRename.png.aieou 8892709206b1488a8859080c914f05419d1f094148bacec1abe2f1b18a0ec7b1.bin.sample.exe File created C:\Users\Admin\Pictures\CompleteSelect.png.aieou 8892709206b1488a8859080c914f05419d1f094148bacec1abe2f1b18a0ec7b1.bin.sample.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.