General
-
Target
payload.exe
-
Size
92KB
-
Sample
210126-hpz1zs7ty6
-
MD5
2db20e2fcd86d00388915088b18f99f2
-
SHA1
3a321bf3980d08fe5754548f5aba7f1bdc967f10
-
SHA256
40a837f93edb2531fe35733d725efb490c7b5199d031a6e087b5041aed6eea05
-
SHA512
b9c179e2b5b82fa59018194e8ee8bb927dfd545c72772de6c98621a071650efa345e9bee0282caac95ccccce1371e440295f61a981d447d5ef699fd81e3d1450
Static task
static1
Behavioral task
behavioral1
Sample
payload.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
payload.exe
Resource
win10v20201028
Malware Config
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Targets
-
-
Target
payload.exe
-
Size
92KB
-
MD5
2db20e2fcd86d00388915088b18f99f2
-
SHA1
3a321bf3980d08fe5754548f5aba7f1bdc967f10
-
SHA256
40a837f93edb2531fe35733d725efb490c7b5199d031a6e087b5041aed6eea05
-
SHA512
b9c179e2b5b82fa59018194e8ee8bb927dfd545c72772de6c98621a071650efa345e9bee0282caac95ccccce1371e440295f61a981d447d5ef699fd81e3d1450
Score10/10-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-