General
-
Target
sample_No1.zip
-
Size
113KB
-
Sample
210417-6cqh23njps
-
MD5
e007d203eb070e1f35fb2c791343a9e2
-
SHA1
fc1f90411c94a59edf6cc42af77ecb654bce973a
-
SHA256
e88f86634b1a30b45429d6f721fef75902fb55a78629f1c0193e1629e955a55d
-
SHA512
260d804b6a9a086b01c68f70f246fcab011eff30cd6bc48006d08c1479554b9bf6bcacd0b1e0f749e315837ebdaf46f99bba9ff5c9a105ab42a28cf40de8d56b
Static task
static1
Behavioral task
behavioral1
Sample
dll64.dll
Resource
win7v20210410
Behavioral task
behavioral2
Sample
dll64.dll
Resource
win10v20210408
Behavioral task
behavioral3
Sample
eiavW.exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
eiavW.exe
Resource
win10v20210410
Malware Config
Extracted
icedid
2642071409
netmoscito2.uno
Extracted
C:\RyukReadMe.txt
ryuk
15RLWdVnY5n1n7mTvU1zjg67wt86dhYqNj
Targets
-
-
Target
dll64.dll
-
Size
43KB
-
MD5
cfad79ca83be1a597222a14d4afb8dbd
-
SHA1
4c2f0f0fad519bcbe7616fd0452dcfb9b0fb2081
-
SHA256
e53d34c5a00e62c90781e918fd5a198475d259a9017cd2b1b5d9b91350c1e876
-
SHA512
8abf010ebd670d90f06e0d2a8e92d84ff8dd3ab3cac03bb11cc5e344a26fb19afae033d86e8f77ecbe2ed0c5b960b42fe7b59a2cbd160f88fd091cd5904f1af4
Score10/10-
IcedID First Stage Loader
-
-
-
Target
eiavW.exe
-
Size
172KB
-
MD5
c0202cf6aeab8437c638533d14563d35
-
SHA1
5767653494d05b3f3f38f1662a63335d09ae6489
-
SHA256
8d3f68b16f0710f858d8c1d2c699260e6f43161a5510abb0e7ba567bd72c965b
-
SHA512
02516128d43914d6ff1b7e702d25771aafd2edccee1729f88ad621cea15a648bb2737b87f564e0711e6f8f99c43eb406b3b6137c68086774f1417642d51c07c0
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-