General
-
Target
test.bin.zip
-
Size
169KB
-
Sample
210307-h9q3ttwqke
-
MD5
9ae60967e095a0c06f3e19f25d4dc29b
-
SHA1
b63452c2a9e86d53193f75fe32b0b367ca7dca1e
-
SHA256
ea91ad196aa6a700469ea4f7454a00dfce68869d284a24497a447383d789febe
-
SHA512
80ff1d788b253cf7d97d0565d123e6c09363348215e8b58d34410d790054560c37473ba7f5802a2445a283cdfe5196425aa4b02c4694b21ef135a559331a0ed0
Static task
static1
Behavioral task
behavioral1
Sample
test.bin.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
test.bin.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
test.bin.exe
Resource
win10v20201028
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\048521667\readme-warning.txt
makop
Targets
-
-
Target
test.bin
-
Size
281KB
-
MD5
41a1fa524a93929a68b58064bb1f86f7
-
SHA1
47f69f81ee8be286f28a3a37337ad711f71b17b3
-
SHA256
419f69ea6641f41f6f0ed44914ed3c8e9fcd0bd9b4ffcb720c60e3d682a9f78d
-
SHA512
39250ec6f09e97cd5cd593038510eb414b680f4b9d112b7f2ff9dc017566671f23100aa01404ace8ecedee3510d1ea1fd8284bacbac1872224f522ce653ffb2d
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-