General
-
Target
Photo-064-2021.jpg.scr
-
Size
126KB
-
Sample
210117-6n2jv8sg32
-
MD5
ea4cf6019062e5555d81bb5510d79b3d
-
SHA1
0d95aa8ade975b9f85c54cdbabd08906a01e51ee
-
SHA256
9a02671ffb82ee83b8f9afd028af3090ecd494bd7d8d7a2e2cc75f0ac187c3b8
-
SHA512
8f1eb4eb9dd561faf05094552bf6769bbfb614de1c7c96cc568e7f45b22fdcdf7d7d7b518041e1ab15b9781ba85dca69c19b9a75cc85bd4aeea3e0540d9f17c9
Static task
static1
Behavioral task
behavioral1
Sample
Photo-064-2021.jpg.scr
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Photo-064-2021.jpg.scr
Resource
win10v20201028
Malware Config
Extracted
C:\WERE_MY _FILES.txt
httpps://www.torproject.org/
http://helpqvrg3cc5mvb3.onion/
Extracted
C:\WERE_MY _FILES.txt
httpps://www.torproject.org/
http://helpqvrg3cc5mvb3.onion/
Targets
-
-
Target
Photo-064-2021.jpg.scr
-
Size
126KB
-
MD5
ea4cf6019062e5555d81bb5510d79b3d
-
SHA1
0d95aa8ade975b9f85c54cdbabd08906a01e51ee
-
SHA256
9a02671ffb82ee83b8f9afd028af3090ecd494bd7d8d7a2e2cc75f0ac187c3b8
-
SHA512
8f1eb4eb9dd561faf05094552bf6769bbfb614de1c7c96cc568e7f45b22fdcdf7d7d7b518041e1ab15b9781ba85dca69c19b9a75cc85bd4aeea3e0540d9f17c9
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-