General
-
Target
b72beb391c75af52c6fb62561f26214b682f12d95660b128d9e21e18e3bff246.bin.sample
-
Size
224KB
-
Sample
210502-pvfezpk9h2
-
MD5
989ee63147c4bcd4f6d46be0fb1c3a9f
-
SHA1
da7338c8027cf9da934479c1fd3317f376639917
-
SHA256
b72beb391c75af52c6fb62561f26214b682f12d95660b128d9e21e18e3bff246
-
SHA512
e0ef202a4584b34d46b2052ec4a708df4ca0e1064158df73bd84b8235d307c8e342ca8f93e9fbc6fa4268a857503468d33400619bc20c8225c1083b1576df382
Static task
static1
Behavioral task
behavioral1
Sample
b72beb391c75af52c6fb62561f26214b682f12d95660b128d9e21e18e3bff246.bin.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
b72beb391c75af52c6fb62561f26214b682f12d95660b128d9e21e18e3bff246.bin.sample.exe
Resource
win10v20210408
Malware Config
Extracted
C:\Users\Public\Documents\RGNR_3CA64D43.txt
ragnarlocker
http://p6o7m73ujalhgkiv.onion/?p=171
http://mykgoj7uvqtgl367.onion/client/?6bECA2b2AFFfBC1Dff0aa0EaaAd468bec0903b5e4Ea58ecde3C264bC55c7389E
http://p6o7m73ujalhgkiv.onion/?page_id=171
Targets
-
-
Target
b72beb391c75af52c6fb62561f26214b682f12d95660b128d9e21e18e3bff246.bin.sample
-
Size
224KB
-
MD5
989ee63147c4bcd4f6d46be0fb1c3a9f
-
SHA1
da7338c8027cf9da934479c1fd3317f376639917
-
SHA256
b72beb391c75af52c6fb62561f26214b682f12d95660b128d9e21e18e3bff246
-
SHA512
e0ef202a4584b34d46b2052ec4a708df4ca0e1064158df73bd84b8235d307c8e342ca8f93e9fbc6fa4268a857503468d33400619bc20c8225c1083b1576df382
Score10/10-
RagnarLocker
Ransomware first seen at the end of 2019, which has been used in targetted attacks against multiple companies.
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-