General
-
Target
fdec933ca1dd1387d970eeea32ce5d1f87940dfb6a403ab5fc149813726cbd65
-
Size
1.3MB
-
Sample
210312-w5dgsx9llj
-
MD5
6be28a4523984698e7154671f73361bf
-
SHA1
b974375ef0f6dcb6ce30558df2ed8570bf1ad642
-
SHA256
fdec933ca1dd1387d970eeea32ce5d1f87940dfb6a403ab5fc149813726cbd65
-
SHA512
c3a44431e8cbb76d75ea2a1caca6fe77dfbd2a9565da918620433d415d396c08394ecb1c6454fc69661d61683711e53b60a69435e25518a04e81c20136f62f20
Static task
static1
Behavioral task
behavioral1
Sample
fdec933ca1dd1387d970eeea32ce5d1f87940dfb6a403ab5fc149813726cbd65.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
fdec933ca1dd1387d970eeea32ce5d1f87940dfb6a403ab5fc149813726cbd65.exe
Resource
win10v20201028
Malware Config
Extracted
C:\PROGRAM FILES\WINDOWS SIDEBAR\GADGETS\SLIDESHOW.GADGET\IMAGES\ON_DESKTOP\readme.txt
dearcry
Targets
-
-
Target
fdec933ca1dd1387d970eeea32ce5d1f87940dfb6a403ab5fc149813726cbd65
-
Size
1.3MB
-
MD5
6be28a4523984698e7154671f73361bf
-
SHA1
b974375ef0f6dcb6ce30558df2ed8570bf1ad642
-
SHA256
fdec933ca1dd1387d970eeea32ce5d1f87940dfb6a403ab5fc149813726cbd65
-
SHA512
c3a44431e8cbb76d75ea2a1caca6fe77dfbd2a9565da918620433d415d396c08394ecb1c6454fc69661d61683711e53b60a69435e25518a04e81c20136f62f20
Score10/10-
Modifies Installed Components in the registry
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-