General
-
Target
b2b3244147fe99552144847d8561eda14c6751e9afda58fc3039c5d11a4b44af.sample
-
Size
216KB
-
Sample
210726-lj3k5tgd9n
-
MD5
832814b3212fd82fbced6afd72b4e8dc
-
SHA1
be3b021f3bd5b86a3d126e1b5d7bde4ccdad6ae5
-
SHA256
b2b3244147fe99552144847d8561eda14c6751e9afda58fc3039c5d11a4b44af
-
SHA512
19f8db46f1095516b3300f933c9b4ea7ecc9c671ecb22eae0a6806e18daf7ad19687b610c52822e27144a6b05270e1e333ff74ea0a58175a9b17c85a016b2ff8
Static task
static1
Behavioral task
behavioral1
Sample
b2b3244147fe99552144847d8561eda14c6751e9afda58fc3039c5d11a4b44af.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
b2b3244147fe99552144847d8561eda14c6751e9afda58fc3039c5d11a4b44af.sample.exe
Resource
win10v20210410
Malware Config
Extracted
C:\ProgramData\cryptinfo.txt
1DtyvLb1pDzXVoaVnJLAFzBJN6b4gcJSdR
Targets
-
-
Target
b2b3244147fe99552144847d8561eda14c6751e9afda58fc3039c5d11a4b44af.sample
-
Size
216KB
-
MD5
832814b3212fd82fbced6afd72b4e8dc
-
SHA1
be3b021f3bd5b86a3d126e1b5d7bde4ccdad6ae5
-
SHA256
b2b3244147fe99552144847d8561eda14c6751e9afda58fc3039c5d11a4b44af
-
SHA512
19f8db46f1095516b3300f933c9b4ea7ecc9c671ecb22eae0a6806e18daf7ad19687b610c52822e27144a6b05270e1e333ff74ea0a58175a9b17c85a016b2ff8
Score10/10-
DMA Locker
Ransomware family with some advanced features, like encryption of unmapped network shares.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-