General
-
Target
e_win.exe
-
Size
75KB
-
Sample
210313-n5neqfeab6
-
MD5
a73d9dc904349b9c967dc6a724806b2d
-
SHA1
e3e6dfd5e0c29acefe90471e46142c120278e9f0
-
SHA256
9a089790e04683ebf37d9746e0284322f59c46eef2a86cc231839482f323e871
-
SHA512
39f2fd0d8f7b63b78a33f44f89d5c01a6ec6c5c194d91d1a8280708e76a13aae0507893779d1e6545fbbdde74b224043e2dfa8b73b5cb4a3265978fdb7625f6d
Static task
static1
Behavioral task
behavioral1
Sample
e_win.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
e_win.exe
Resource
win10v20201028
Malware Config
Extracted
C:\How To Restore Your Files.txt
http://wavbeudogz6byhnardd2lkp2jafims3j7tj6k6qnywchn2csngvtffqd.onion/blog/a4c7531a5c7287d8b77d240e0ee1755d5b257fb1f9fabbf89989d96304ddff2b/
https://i.imgur.com/66Yz8gK.png
https://i.imgur.com/udaME7G.png
https://i.imgur.com/ExpwRFZ.png
https://i.imgur.com/TmotQHx.png
https://i.imgur.com/KyDqrjO.png
https://i.imgur.com/ISCG6BB.png
https://i.imgur.com/CKVnYd4.png
https://i.imgur.com/Ga17uEy.png
https://i.imgur.com/CFzkdY5.png
https://i.imgur.com/aeArm5h.png
https://i.imgur.com/sYkAv3o.png
https://i.imgur.com/NbWcEBt.png
https://i.imgur.com/Yo72lP5.png
https://i.imgur.com/N1UTyCk.png
https://i.imgur.com/0cDog0s.png
http://wavbeudogz6byhnardd2lkp2jafims3j7tj6k6qnywchn2csngvtffqd.onion/
http://tsu2dpiiv4zjzfyq73eibemit2qyrimbbb6lhpm6n5ihgallom5lhdyd.onion/f57e6bc503b702905293ce18001127863b953b9cf1194a0eca02f6c8aec6dae5
Targets
-
-
Target
e_win.exe
-
Size
75KB
-
MD5
a73d9dc904349b9c967dc6a724806b2d
-
SHA1
e3e6dfd5e0c29acefe90471e46142c120278e9f0
-
SHA256
9a089790e04683ebf37d9746e0284322f59c46eef2a86cc231839482f323e871
-
SHA512
39f2fd0d8f7b63b78a33f44f89d5c01a6ec6c5c194d91d1a8280708e76a13aae0507893779d1e6545fbbdde74b224043e2dfa8b73b5cb4a3265978fdb7625f6d
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-