General
-
Target
63096f288f49b25d50f4aea52dc1fc00871b3927fa2a81fa0b0d752b261a3059.sample
-
Size
42KB
-
Sample
210726-wbbl73r8l2
-
MD5
0fbbc59d4fe280a55c1fb6f5502c1e73
-
SHA1
af53890ed1d4753e7493d48862bdd7d18a2b11f6
-
SHA256
63096f288f49b25d50f4aea52dc1fc00871b3927fa2a81fa0b0d752b261a3059
-
SHA512
20b87ac354cefa2b75e8edbe30b903c51e4f2c2cb49f59dd40732d964612a69b149cb10274feab5c6971c8adfc91fba11f1ebeba38e1b2d45c6b1b4d3dd37633
Static task
static1
Behavioral task
behavioral1
Sample
63096f288f49b25d50f4aea52dc1fc00871b3927fa2a81fa0b0d752b261a3059.sample.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
63096f288f49b25d50f4aea52dc1fc00871b3927fa2a81fa0b0d752b261a3059.sample.exe
Resource
win10v20210410
Malware Config
Extracted
C:\Users\Public\Documents\RGNR_F540D252.txt
ragnarlocker
http://mykgoj7uvqtgl367.onion/client/?61bcbDc31F1c894054C3B84aF53C35cF3005e1A69366A6e857a5a4fd60fb7184
Targets
-
-
Target
63096f288f49b25d50f4aea52dc1fc00871b3927fa2a81fa0b0d752b261a3059.sample
-
Size
42KB
-
MD5
0fbbc59d4fe280a55c1fb6f5502c1e73
-
SHA1
af53890ed1d4753e7493d48862bdd7d18a2b11f6
-
SHA256
63096f288f49b25d50f4aea52dc1fc00871b3927fa2a81fa0b0d752b261a3059
-
SHA512
20b87ac354cefa2b75e8edbe30b903c51e4f2c2cb49f59dd40732d964612a69b149cb10274feab5c6971c8adfc91fba11f1ebeba38e1b2d45c6b1b4d3dd37633
Score10/10-
RagnarLocker
Ransomware first seen at the end of 2019, which has been used in targetted attacks against multiple companies.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-