General
-
Target
fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb
-
Size
157KB
-
Sample
210209-36824yd1l2
-
MD5
85cd7c6931b44a14f4899dfd0039e8b4
-
SHA1
5822f65dec879ba585112976a632b2c4435abf90
-
SHA256
fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb
-
SHA512
9a8173eb7f08c1c9e2c9b66b2866c08a5e97bc16ceb3644a55cc9da17dec1b9941f0e30c23994952d31b3b60911d13e7cc20810ecada35cdca4bff72ccad5a15
Static task
static1
Behavioral task
behavioral1
Sample
fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe
Resource
win10v20201028
Malware Config
Extracted
C:\Documents and Settings\read_me_lkd.txt
http://6x7dp6h3w6q3ugjv4yv5gycj3femb24kysgry5b44hhgfwc5ml5qrdad.onion/d87c3f9baf85b2e9ab2a824bb78868294e19992e2e26b54f248abfa73c42a7c0
Targets
-
-
Target
fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb
-
Size
157KB
-
MD5
85cd7c6931b44a14f4899dfd0039e8b4
-
SHA1
5822f65dec879ba585112976a632b2c4435abf90
-
SHA256
fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb
-
SHA512
9a8173eb7f08c1c9e2c9b66b2866c08a5e97bc16ceb3644a55cc9da17dec1b9941f0e30c23994952d31b3b60911d13e7cc20810ecada35cdca4bff72ccad5a15
Score10/10-
HelloKitty Ransomware
Ransomware family which has been active since late 2020, and in early 2021 a variant compromised the CDProjektRed game studio.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-