General
-
Target
4c51a104fa1bca7b0523fd1998474b74e8893cef48f877e43cef582ec84ab640.sample
-
Size
15KB
-
Sample
210726-pc41dq7sds
-
MD5
2a673709121d05bc57863002f8c62c51
-
SHA1
3b26393fc5f2c5ae8f088e96a1e79f80273d4947
-
SHA256
4c51a104fa1bca7b0523fd1998474b74e8893cef48f877e43cef582ec84ab640
-
SHA512
1dbc7e7bf666f8963abfdb87cc7b131791309123288557152a3e4d30c259b2fcc26a3d52103a14abb7c6f95dbe9fc4fb943d4813719a967976396c4ba321cdbf
Static task
static1
Behavioral task
behavioral1
Sample
4c51a104fa1bca7b0523fd1998474b74e8893cef48f877e43cef582ec84ab640.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
4c51a104fa1bca7b0523fd1998474b74e8893cef48f877e43cef582ec84ab640.sample.exe
Resource
win10v20210410
Malware Config
Extracted
C:\[HOW TO RECOVER FILES].TXT
prolock
chec1kyourf1les@protonmail.com
http://ug76vzhn2fujp6of2mjb6rjt4rploqe4q5gr2bkuaiwmzpf7nehzpsqd.onion
Targets
-
-
Target
4c51a104fa1bca7b0523fd1998474b74e8893cef48f877e43cef582ec84ab640.sample
-
Size
15KB
-
MD5
2a673709121d05bc57863002f8c62c51
-
SHA1
3b26393fc5f2c5ae8f088e96a1e79f80273d4947
-
SHA256
4c51a104fa1bca7b0523fd1998474b74e8893cef48f877e43cef582ec84ab640
-
SHA512
1dbc7e7bf666f8963abfdb87cc7b131791309123288557152a3e4d30c259b2fcc26a3d52103a14abb7c6f95dbe9fc4fb943d4813719a967976396c4ba321cdbf
Score10/10-
Drops desktop.ini file(s)
-