General
-
Target
paralock.zip
-
Size
21KB
-
Sample
210212-6mttr2hs92
-
MD5
83f9f8867c9c16c42f33bb79f0458707
-
SHA1
f2f23cecfb4f9a560b1594dccb010eb85e491d8b
-
SHA256
2a6e52be64513ee856e20eaeeeba58baa4b656dbbf517ca4a7e2e9f3a7180c39
-
SHA512
8986ca5988721277988d70306853c41c4eff5abbac5e11319d09a6de572cbe53845355620bcdee65f4e469f12548269ea802797e06b11636b67fa59361d2509e
Static task
static1
Behavioral task
behavioral1
Sample
___________.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
___________.exe
Resource
win10v20201028
Malware Config
Extracted
C:\Users\Admin\Desktop\info.hta
Extracted
C:\Users\Admin\Desktop\info.hta
Targets
-
-
Target
___________.exe
-
Size
48KB
-
MD5
221f1b97cd8e9766bebd001960b31dc4
-
SHA1
4c3367638ffca90ae5eb5a644a9beaec1853f36c
-
SHA256
a5f47b1b2efcf8bd7e36a072941fb9ee0ce780e6f410d6c85c503ccea24d29e6
-
SHA512
7e86b0fc428b8fc97251eb0bf2639b2c780d7a45b730b475794107312e6edd963355aca59c8eee34380800006531a8dbeae152f3542291f0c3154c0d1fbb96d6
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory
-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-