General
-
Target
be1f6aa3d2c2d61721aa96d8530a65387591252248de520ffed4bfdde0368dde.bin.sample
-
Size
425KB
-
Sample
201224-what5d3t6n
-
MD5
c486aedae4bb88c1bd5064f12df7e188
-
SHA1
9880e8a0655cf1d0dad855703b85e1bb9bd4db82
-
SHA256
be1f6aa3d2c2d61721aa96d8530a65387591252248de520ffed4bfdde0368dde
-
SHA512
fbcccfbc92782740ad542038b2ae3b0d6926d87deeaed6f25dbcf1db4bc00a36af1fe8e74a642fd6a40ee625199b210fad119afbc2a5b7c87c96f603343b2f16
Static task
static1
Behavioral task
behavioral1
Sample
be1f6aa3d2c2d61721aa96d8530a65387591252248de520ffed4bfdde0368dde.bin.sample.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
be1f6aa3d2c2d61721aa96d8530a65387591252248de520ffed4bfdde0368dde.bin.sample.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
be1f6aa3d2c2d61721aa96d8530a65387591252248de520ffed4bfdde0368dde.bin.sample
-
Size
425KB
-
MD5
c486aedae4bb88c1bd5064f12df7e188
-
SHA1
9880e8a0655cf1d0dad855703b85e1bb9bd4db82
-
SHA256
be1f6aa3d2c2d61721aa96d8530a65387591252248de520ffed4bfdde0368dde
-
SHA512
fbcccfbc92782740ad542038b2ae3b0d6926d87deeaed6f25dbcf1db4bc00a36af1fe8e74a642fd6a40ee625199b210fad119afbc2a5b7c87c96f603343b2f16
Score8/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-