General
-
Target
seon
-
Size
62KB
-
Sample
210319-jsns8fz13e
-
MD5
7d3573bee1a9acd192c50bc72a65ef7a
-
SHA1
8ff77e69046c8cecd4407c536219e6fc1a747af7
-
SHA256
221ab2fabe92b623834e7214d05dbef0cdc2b4399d34721de63e7c32ab5820ea
-
SHA512
dcf3998861c2c1818d05ba526134edddee58bea51d4065ec5d156dfac2d24a63d65df057a1319e0886bdf37a394f82fb4435c0292c3e1f135646623ad3aaf347
Static task
static1
Behavioral task
behavioral1
Sample
seon.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
seon.exe
Resource
win10v20201028
Malware Config
Extracted
C:\MSOCache\YOUR_FILES_ARE_ENCRYPTED.TXT
Extracted
C:\Users\Admin\AppData\Local\Temp\readme.hta
Targets
-
-
Target
seon
-
Size
62KB
-
MD5
7d3573bee1a9acd192c50bc72a65ef7a
-
SHA1
8ff77e69046c8cecd4407c536219e6fc1a747af7
-
SHA256
221ab2fabe92b623834e7214d05dbef0cdc2b4399d34721de63e7c32ab5820ea
-
SHA512
dcf3998861c2c1818d05ba526134edddee58bea51d4065ec5d156dfac2d24a63d65df057a1319e0886bdf37a394f82fb4435c0292c3e1f135646623ad3aaf347
Score10/10-
Seon
The Seon Ransomware is an encryption ransomware Trojan first observed on November 14, 2018.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-