General
-
Target
CyberPunk2077.exe
-
Size
9.9MB
-
Sample
201127-vtsxc8k5nx
-
MD5
9bb3e77f3a2b7329ca41979a783996ae
-
SHA1
fb4d3e1fe06bab2bb9255f18b1e8e079fbf6de06
-
SHA256
08124c7d2c97ffd108f1b7c9bba86aaeff5a41d16c77fcf11b3a8c9504f93424
-
SHA512
d1c4567034e479956c43660c4553d8aff2242dae7c414900747cdb0d59ace891bdf5774474e8509a8c33291dbf13561bfadd4758d77d2f60ae8e9cb262a08bf1
Static task
static1
Behavioral task
behavioral1
Sample
CyberPunk2077.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
CyberPunk2077.exe
Resource
win10v20201028
Malware Config
Extracted
C:\Users\Admin\Desktop\README.txt
336Fvf8fRrpySwq8gsaWdf7gfuGm5FQi8K
https://buy.moonpay.io
Targets
-
-
Target
CyberPunk2077.exe
-
Size
9.9MB
-
MD5
9bb3e77f3a2b7329ca41979a783996ae
-
SHA1
fb4d3e1fe06bab2bb9255f18b1e8e079fbf6de06
-
SHA256
08124c7d2c97ffd108f1b7c9bba86aaeff5a41d16c77fcf11b3a8c9504f93424
-
SHA512
d1c4567034e479956c43660c4553d8aff2242dae7c414900747cdb0d59ace891bdf5774474e8509a8c33291dbf13561bfadd4758d77d2f60ae8e9cb262a08bf1
Score10/10-
Drops file in Drivers directory
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
JavaScript code in executable
-
Drops file in System32 directory
-