General
-
Target
dd4eb8aa3371b7fd821a7a9730c924cf.exe
-
Size
194KB
-
Sample
210602-fr7h11p5ej
-
MD5
dd4eb8aa3371b7fd821a7a9730c924cf
-
SHA1
3e53f7bf7dcb8569aaf0f3a3bcf67bda4c01c054
-
SHA256
9bf0633f41d2962ba5e2895ece2ef9fa7b546ada311ca30f330f0d261a7fb184
-
SHA512
12e760a59377632548f41bbdb98941a04c7d32b5d084f70b23db702dbeabb1e7a489df6d03af40da977a463150e4d144641fbc4640037e8858897a0509c9f356
Static task
static1
Behavioral task
behavioral1
Sample
dd4eb8aa3371b7fd821a7a9730c924cf.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
dd4eb8aa3371b7fd821a7a9730c924cf.exe
Resource
win10v20210408
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RESTORE_FILES_INFO.txt
prometheus
https://privatlab.com/file
http://sonarmsniko2lvfu.onion/?a=reg
Extracted
C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta
prometheus
https://privatlab.com/file
http://sonarmsniko2lvfu.onion/?a=reg
Extracted
C:\Users\Admin\AppData\Local\Temp\RESTORE_FILES_INFO.txt
prometheus
https://privatlab.com/file
http://sonarmsniko2lvfu.onion/?a=reg
Extracted
C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta
prometheus
https://privatlab.com/file
http://sonarmsniko2lvfu.onion/?a=reg
Targets
-
-
Target
dd4eb8aa3371b7fd821a7a9730c924cf.exe
-
Size
194KB
-
MD5
dd4eb8aa3371b7fd821a7a9730c924cf
-
SHA1
3e53f7bf7dcb8569aaf0f3a3bcf67bda4c01c054
-
SHA256
9bf0633f41d2962ba5e2895ece2ef9fa7b546ada311ca30f330f0d261a7fb184
-
SHA512
12e760a59377632548f41bbdb98941a04c7d32b5d084f70b23db702dbeabb1e7a489df6d03af40da977a463150e4d144641fbc4640037e8858897a0509c9f356
Score10/10-
Prometheus Ransomware
Ransomware family mostly targeting manufacturing industry and claims to be affiliated with REvil.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Downloads PsExec from SysInternals website
Sysinternals tools like PsExec are often leveraged maliciously by malware families due to being commonly used by testers/administrators.
-
Modifies Windows Firewall
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Drops startup file
-
Modifies file permissions
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Modifies WinLogon
-