General
-
Target
92eea22c70cf0fe4116b1021e91eb373
-
Size
61KB
-
Sample
210812-yn4wfndeaa
-
MD5
92eea22c70cf0fe4116b1021e91eb373
-
SHA1
66b8c24be3b82ecbbebb5e5a70ddf746d212e16f
-
SHA256
73d55d99c41e89daa8c9bd213d02974d89b53c3e5a0dcd5bbf0b99ff36424cac
-
SHA512
b8d2b6bba4027bda2ac3ef09c346a1e8ee768afb990bcacbd860bbead42a420303814e4f4081a32b81f89085b53879f7ce888c864cf34654a7c066facb44d035
Static task
static1
Behavioral task
behavioral1
Sample
92eea22c70cf0fe4116b1021e91eb373.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
92eea22c70cf0fe4116b1021e91eb373.exe
Resource
win10v20210408
Malware Config
Targets
-
-
Target
92eea22c70cf0fe4116b1021e91eb373
-
Size
61KB
-
MD5
92eea22c70cf0fe4116b1021e91eb373
-
SHA1
66b8c24be3b82ecbbebb5e5a70ddf746d212e16f
-
SHA256
73d55d99c41e89daa8c9bd213d02974d89b53c3e5a0dcd5bbf0b99ff36424cac
-
SHA512
b8d2b6bba4027bda2ac3ef09c346a1e8ee768afb990bcacbd860bbead42a420303814e4f4081a32b81f89085b53879f7ce888c864cf34654a7c066facb44d035
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-