General
-
Target
319fbb2dd26045a90a452eb26799c6529f8a77ad8d7b967aec58111e25b12cd5
-
Size
12KB
-
Sample
201203-2rjjtlt6be
-
MD5
0a5e38ff165e9e78e58fd5b47b19b86a
-
SHA1
d0cccb38776b7390bf8b0fc5ebe14a75b1dfa3ef
-
SHA256
319fbb2dd26045a90a452eb26799c6529f8a77ad8d7b967aec58111e25b12cd5
-
SHA512
330c946e02bab30f4f33a6b246c0ad3d83438dddd1572d499aca2af5a1789714b81ba08729c2917ad8b6090ccb2b476d3a88f6bfd537ebd5a2f0e8ff9048ab67
Static task
static1
Behavioral task
behavioral1
Sample
319fbb2dd26045a90a452eb26799c6529f8a77ad8d7b967aec58111e25b12cd5.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
319fbb2dd26045a90a452eb26799c6529f8a77ad8d7b967aec58111e25b12cd5.exe
Resource
win10v20201028
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-293278959-2699126792-324916226-1000\HOW TO DECRYPT FILES.txt
37t6hwuzJbq6PtEgaxyS3AWyLS99qMGrt8
Targets
-
-
Target
319fbb2dd26045a90a452eb26799c6529f8a77ad8d7b967aec58111e25b12cd5
-
Size
12KB
-
MD5
0a5e38ff165e9e78e58fd5b47b19b86a
-
SHA1
d0cccb38776b7390bf8b0fc5ebe14a75b1dfa3ef
-
SHA256
319fbb2dd26045a90a452eb26799c6529f8a77ad8d7b967aec58111e25b12cd5
-
SHA512
330c946e02bab30f4f33a6b246c0ad3d83438dddd1572d499aca2af5a1789714b81ba08729c2917ad8b6090ccb2b476d3a88f6bfd537ebd5a2f0e8ff9048ab67
Score10/10-
Drops file in Drivers directory
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
Drops file in System32 directory
-