General
-
Target
readme.js
-
Size
843KB
-
Sample
210201-gn2z1a6yhe
-
MD5
871b84c3e9c24b706b51eb717ee50627
-
SHA1
696ff0a47d733e11a1468ee898ff31c9c27a9937
-
SHA256
c16916fbad3101fbbb241ec7a8ebbb5e46288a6dfeed80c70e47127d1ae9b965
-
SHA512
7e15b8e85b084cdc30990f696e5d9be6c67c457a89a47043e379209fb6a31446a1e6a75e3195b77037f0f703f33f6dcfca7c6ce10f68f617527673ec2956cee1
Static task
static1
Behavioral task
behavioral1
Sample
readme.js
Resource
win7v20201028
Behavioral task
behavioral2
Sample
readme.js
Resource
win10v20201028
Malware Config
Targets
-
-
Target
readme.js
-
Size
843KB
-
MD5
871b84c3e9c24b706b51eb717ee50627
-
SHA1
696ff0a47d733e11a1468ee898ff31c9c27a9937
-
SHA256
c16916fbad3101fbbb241ec7a8ebbb5e46288a6dfeed80c70e47127d1ae9b965
-
SHA512
7e15b8e85b084cdc30990f696e5d9be6c67c457a89a47043e379209fb6a31446a1e6a75e3195b77037f0f703f33f6dcfca7c6ce10f68f617527673ec2956cee1
Score10/10-
Blocklisted process makes network request
-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-