General
-
Target
asd123.exe
-
Size
34KB
-
Sample
210310-za4wfzzvca
-
MD5
241923a0f67c30149e3d8bd549d082ef
-
SHA1
221593f4ffa9f48f4d7acb94ba7d07e0eef76bff
-
SHA256
6a3cb19821f2b9960b845ccadec9f58dfac01adc1753b0baf90dc49dac1d1da1
-
SHA512
d64a53eecefd98197704d86ae2b977d9e2ff822ae3edc0f8df488102bb7205486117b52146fc45aa1de0b985bdf63e58d12db586f1d4fa19bbce24c41fedac3f
Static task
static1
Behavioral task
behavioral1
Sample
asd123.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
asd123.exe
Resource
win10v20201028
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\readme-warning.txt
makop
Targets
-
-
Target
asd123.exe
-
Size
34KB
-
MD5
241923a0f67c30149e3d8bd549d082ef
-
SHA1
221593f4ffa9f48f4d7acb94ba7d07e0eef76bff
-
SHA256
6a3cb19821f2b9960b845ccadec9f58dfac01adc1753b0baf90dc49dac1d1da1
-
SHA512
d64a53eecefd98197704d86ae2b977d9e2ff822ae3edc0f8df488102bb7205486117b52146fc45aa1de0b985bdf63e58d12db586f1d4fa19bbce24c41fedac3f
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies Installed Components in the registry
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-