General
-
Target
d85188c58acb395ae88ad2be1f48044090eb03f125c97692c20787b933bbbd1a.bin
-
Size
2.5MB
-
Sample
210317-6vkqva8c6a
-
MD5
1a2978ce842c0d4c2fc309801cbbcabb
-
SHA1
45adb2e2ee26e9221b76e71180dc955b7c9eff70
-
SHA256
d85188c58acb395ae88ad2be1f48044090eb03f125c97692c20787b933bbbd1a
-
SHA512
5cefd6c89153259835cdd0e4be1c68bf61ccf25c63c8a2bcf78e0bcbde354ca588e39e06699820ca4da488f3e69a14e04f89d25cd1be6c01c80fb210f9da23ac
Static task
static1
Behavioral task
behavioral1
Sample
d85188c58acb395ae88ad2be1f48044090eb03f125c97692c20787b933bbbd1a.bin.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
d85188c58acb395ae88ad2be1f48044090eb03f125c97692c20787b933bbbd1a.bin.exe
Resource
win10v20201028
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW TO RESTORE YOUR FILES.TXT
Targets
-
-
Target
d85188c58acb395ae88ad2be1f48044090eb03f125c97692c20787b933bbbd1a.bin
-
Size
2.5MB
-
MD5
1a2978ce842c0d4c2fc309801cbbcabb
-
SHA1
45adb2e2ee26e9221b76e71180dc955b7c9eff70
-
SHA256
d85188c58acb395ae88ad2be1f48044090eb03f125c97692c20787b933bbbd1a
-
SHA512
5cefd6c89153259835cdd0e4be1c68bf61ccf25c63c8a2bcf78e0bcbde354ca588e39e06699820ca4da488f3e69a14e04f89d25cd1be6c01c80fb210f9da23ac
Score10/10-
Detecting the common Go functions and variables names used by Snatch ransomware
-
Snatch Ransomware
Ransomware family generally distributed through RDP bruteforce attacks.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-