General
-
Target
Setup.exe.lnk
-
Size
1KB
-
Sample
210122-72b93f6nv6
-
MD5
ce0a1a679127310043bbe215c0296fb7
-
SHA1
a8df0b8eec8ada6fb9c929e856783bcad76853a9
-
SHA256
dab776240d6cc6c074552e75ffb5e849e51caf821707ea3e30cef2b115fd4024
-
SHA512
26ae4366d2c3e8da76834a72150b33592a93bb85761fdb1e7c562931333cf8b27b7256e0ab98006b1325b7993851863b145aedeba650bd7a845c32e2c7f5230f
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe.lnk
Resource
win7v20201028
Malware Config
Extracted
https://bit.ly/2MicNjm
Targets
-
-
Target
Setup.exe.lnk
-
Size
1KB
-
MD5
ce0a1a679127310043bbe215c0296fb7
-
SHA1
a8df0b8eec8ada6fb9c929e856783bcad76853a9
-
SHA256
dab776240d6cc6c074552e75ffb5e849e51caf821707ea3e30cef2b115fd4024
-
SHA512
26ae4366d2c3e8da76834a72150b33592a93bb85761fdb1e7c562931333cf8b27b7256e0ab98006b1325b7993851863b145aedeba650bd7a845c32e2c7f5230f
Score10/10-
Blocklisted process makes network request
-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-