General
-
Target
notif9551.xls
-
Size
31KB
-
Sample
210120-xdr1f1wvfa
-
MD5
8892f7bf793c729f1367f8fd0b89371d
-
SHA1
b491215ec214dcd8d8a37273d186d26da784ea17
-
SHA256
1a457bbc6c53f2977963f9a5a10d6d0ef97bdc96c9dc3826aa41743376e854b6
-
SHA512
b2940379f36dcc1eb2d2ca54b9559daa55b40199b6d3041167301f4c29e8ff336d27b96f718e3fd5dbec2d8ffcfd6d1829ebf10d2a7412d09400dfa13adc8abe
Behavioral task
behavioral1
Sample
notif9551.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
notif9551.xls
Resource
win10v20201028
Malware Config
Extracted
https://ezucycam.com/k.php
Targets
-
-
Target
notif9551.xls
-
Size
31KB
-
MD5
8892f7bf793c729f1367f8fd0b89371d
-
SHA1
b491215ec214dcd8d8a37273d186d26da784ea17
-
SHA256
1a457bbc6c53f2977963f9a5a10d6d0ef97bdc96c9dc3826aa41743376e854b6
-
SHA512
b2940379f36dcc1eb2d2ca54b9559daa55b40199b6d3041167301f4c29e8ff336d27b96f718e3fd5dbec2d8ffcfd6d1829ebf10d2a7412d09400dfa13adc8abe
Score10/10-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-