General
-
Target
ed2b1f855fc7a39a7cf2cfbfd5a10707801ba313bab9c5d748fcd3703aad66fc
-
Size
156KB
-
Sample
210820-dgat5wj26a
-
MD5
b2bc74d95c8bd5b5db9c02df6a6ae2d3
-
SHA1
e7748b92347f95589fa739cbe5c089046614ce92
-
SHA256
ed2b1f855fc7a39a7cf2cfbfd5a10707801ba313bab9c5d748fcd3703aad66fc
-
SHA512
bda491ab197205d48956f9bc1b45009abba701e6ebb4ee551bfc2b58a0ed7a58a5793624cb2884f9efcbfbf647b1792d619dbb83917cfad9f412593c4cdb498b
Static task
static1
Behavioral task
behavioral1
Sample
ed2b1f855fc7a39a7cf2cfbfd5a10707801ba313bab9c5d748fcd3703aad66fc.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
ed2b1f855fc7a39a7cf2cfbfd5a10707801ba313bab9c5d748fcd3703aad66fc.exe
Resource
win10v20210410
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\!TXDOT_READ_ME!.txt
Targets
-
-
Target
ed2b1f855fc7a39a7cf2cfbfd5a10707801ba313bab9c5d748fcd3703aad66fc
-
Size
156KB
-
MD5
b2bc74d95c8bd5b5db9c02df6a6ae2d3
-
SHA1
e7748b92347f95589fa739cbe5c089046614ce92
-
SHA256
ed2b1f855fc7a39a7cf2cfbfd5a10707801ba313bab9c5d748fcd3703aad66fc
-
SHA512
bda491ab197205d48956f9bc1b45009abba701e6ebb4ee551bfc2b58a0ed7a58a5793624cb2884f9efcbfbf647b1792d619dbb83917cfad9f412593c4cdb498b
Score10/10-
Deletes NTFS Change Journal
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
-
RansomEXX Ransomware
Targeted ransomware with variants which affect Windows and Linux systems.
-
Clears Windows event logs
-
Modifies boot configuration data using bcdedit
-
Disables use of System Restore points
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Overwrites deleted data with Cipher tool
Cipher is a Windows tool which be used to securely wipe deallocated HDD space, preventing recovery of deleted data.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-