General
-
Target
sample_No2.zip
-
Size
621KB
-
Sample
210417-v8retm447a
-
MD5
96be737bf47ac991c0dc9be996e0f10b
-
SHA1
2739c52ce389aad8214224617a04e5b494c410b3
-
SHA256
831a54f66b7645119d642dab565d86f4316752f6f2f759f9cc10737a34032ebf
-
SHA512
20675f2b1a9cd1fd091a48b535d8f37e42001fce393d1d180f21017ce4b1f999f3488d8da1985d641ff838716124f51cfb1adadb727c4740199babe7d9481711
Static task
static1
Behavioral task
behavioral1
Sample
dll64.dll
Resource
win7v20210408
Behavioral task
behavioral2
Sample
dll64.dll
Resource
win10v20210410
Behavioral task
behavioral3
Sample
svchost.exe
Resource
win7v20210408
Behavioral task
behavioral4
Sample
svchost.exe
Resource
win10v20210410
Malware Config
Extracted
icedid
2642071409
netmoscito2.uno
Extracted
C:\RyukReadMe.txt
ryuk
15RLWdVnY5n1n7mTvU1zjg67wt86dhYqNj
Targets
-
-
Target
dll64.dll
-
Size
43KB
-
MD5
cfad79ca83be1a597222a14d4afb8dbd
-
SHA1
4c2f0f0fad519bcbe7616fd0452dcfb9b0fb2081
-
SHA256
e53d34c5a00e62c90781e918fd5a198475d259a9017cd2b1b5d9b91350c1e876
-
SHA512
8abf010ebd670d90f06e0d2a8e92d84ff8dd3ab3cac03bb11cc5e344a26fb19afae033d86e8f77ecbe2ed0c5b960b42fe7b59a2cbd160f88fd091cd5904f1af4
Score10/10-
IcedID First Stage Loader
-
-
-
Target
svchost.exe
-
Size
726KB
-
MD5
8a317e1b7c9671698a8467c6a7786782
-
SHA1
d166a8738595e3dd83c32ec30a221cda7daeac8f
-
SHA256
59ec0fa1c554bc9d1253ab499e20eb28d19ed9aa324f642051ce3f322adfaf5f
-
SHA512
74bbfbfe3aa43d3d3f0e58f739efdf0d9409fd09616035bd3c42fe236864437814363ffc311b0e2987afe733023b073ada7ab2cb8487d4ca2804264d487fb730
Score10/10-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-