General
-
Target
d56cfe09f291b11e27b84ede219459ede65652a19596a0b33f8a3ef871236cf5.bin.sample.gz
-
Size
81KB
-
Sample
210621-et1vzla7t2
-
MD5
b5716bc979dc915412bfee36212caa79
-
SHA1
47901c667f7cca4f8e77a86290cdafea5cedf55c
-
SHA256
69223352d033163529a18d256ccc5a4e2ac70bb4111c28dff35fcc70a413ad48
-
SHA512
2e6801166eb220578fc25dd7f0dca8db2e38ac9edd7dbea941b61366cb0c986e1b8d990d936aacd3744f0710e60b62939bb35f7369a241228ea5fde1ef4efcf2
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v20210410
Malware Config
Targets
-
-
Target
sample
-
Size
81KB
-
MD5
9c543a3b162b8e9317c717892ba47691
-
SHA1
52980b81ca21b6c02793272dea788f18c03c66bf
-
SHA256
d56cfe09f291b11e27b84ede219459ede65652a19596a0b33f8a3ef871236cf5
-
SHA512
502a5390c777c4c8f3848c66b7accc670b0ebbc7947253d8bb2c73e3b55097870f97142088d337c125d0e545a96ac3e06688c81a0f4935541439a7d58d918c04
Score10/10-
Modifies WinLogon for persistence
-
Disables Task Manager via registry modification
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-