General
-
Target
ransom.exe
-
Size
34KB
-
Sample
210601-226edze4ba
-
MD5
41a2f1caab50ebde2911ec0aa9e0dc30
-
SHA1
dce8b1773b2944d4e28d8c53c3224acd1e53c4cc
-
SHA256
33ff0db152d0f78636522a1825b9366d71fc1bbc667158e8a3019a5beec609ff
-
SHA512
d62ceef70c45124a4837523095dbd492be6b267ed01ee70a2e46518e713636b82fa94047da4a13a68aa6d8f46c8e8b0fe44527182216f3440f1d3442c39175d6
Static task
static1
Behavioral task
behavioral1
Sample
ransom.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
ransom.exe
Resource
win10v20210410
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\readme-warning.txt
https://tox.chat/
Extracted
C:\Users\Admin\AppData\Local\Temp\readme-warning.txt
https://tox.chat/
Targets
-
-
Target
ransom.exe
-
Size
34KB
-
MD5
41a2f1caab50ebde2911ec0aa9e0dc30
-
SHA1
dce8b1773b2944d4e28d8c53c3224acd1e53c4cc
-
SHA256
33ff0db152d0f78636522a1825b9366d71fc1bbc667158e8a3019a5beec609ff
-
SHA512
d62ceef70c45124a4837523095dbd492be6b267ed01ee70a2e46518e713636b82fa94047da4a13a68aa6d8f46c8e8b0fe44527182216f3440f1d3442c39175d6
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-