General
-
Target
570fbe91fdd6d1eb8cfd2f03c032cdde.exe
-
Size
872KB
-
Sample
210604-q1mqz6zlf2
-
MD5
570fbe91fdd6d1eb8cfd2f03c032cdde
-
SHA1
59d07617c682fed330d82b1d97f1bf32c30c6ff1
-
SHA256
b4a1845a21726b4826eb4157114d424c9a0f1c3112f67f587cbea352dd33ac61
-
SHA512
e0cd9f67e26140b22dbcee760b0690e5dd2bb0242091d3c759c123789c6b2bb8abbf1c2a80d6b4e1b00f9097f4f782ba2035041c92afc2280dd75a9dc21f7fb6
Static task
static1
Behavioral task
behavioral1
Sample
570fbe91fdd6d1eb8cfd2f03c032cdde.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
570fbe91fdd6d1eb8cfd2f03c032cdde.exe
Resource
win10v20210408
Malware Config
Extracted
C:\_readme.txt
djvu
https://we.tl/t-B0FsLNO3fN
Targets
-
-
Target
570fbe91fdd6d1eb8cfd2f03c032cdde.exe
-
Size
872KB
-
MD5
570fbe91fdd6d1eb8cfd2f03c032cdde
-
SHA1
59d07617c682fed330d82b1d97f1bf32c30c6ff1
-
SHA256
b4a1845a21726b4826eb4157114d424c9a0f1c3112f67f587cbea352dd33ac61
-
SHA512
e0cd9f67e26140b22dbcee760b0690e5dd2bb0242091d3c759c123789c6b2bb8abbf1c2a80d6b4e1b00f9097f4f782ba2035041c92afc2280dd75a9dc21f7fb6
Score10/10-
Detected Djvu ransomeware
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Modifies file permissions
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-