General
-
Target
f543c477ba67afd4fb2ae111b22c8d596bf8e61e13a627f6a972fac4762a70c1
-
Size
156KB
-
Sample
210820-s34d1zxvza
-
MD5
c063c86931c662c1a962d08915d9f3a8
-
SHA1
fc9284b7a140c0d411ebd0eb4752e477d5d213fc
-
SHA256
f543c477ba67afd4fb2ae111b22c8d596bf8e61e13a627f6a972fac4762a70c1
-
SHA512
d90d80f0ad27d38e0e70079de3a090dfab41d07465be0031745fc60a3fd4303ea8b7e7b852a377838a4c159a65f9ed3fb2b49c4ba1f713fd1ddc09df77006b3e
Static task
static1
Behavioral task
behavioral1
Sample
f543c477ba67afd4fb2ae111b22c8d596bf8e61e13a627f6a972fac4762a70c1.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
f543c477ba67afd4fb2ae111b22c8d596bf8e61e13a627f6a972fac4762a70c1.exe
Resource
win10v20210408
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\!TXDOT_READ_ME!.txt
Targets
-
-
Target
f543c477ba67afd4fb2ae111b22c8d596bf8e61e13a627f6a972fac4762a70c1
-
Size
156KB
-
MD5
c063c86931c662c1a962d08915d9f3a8
-
SHA1
fc9284b7a140c0d411ebd0eb4752e477d5d213fc
-
SHA256
f543c477ba67afd4fb2ae111b22c8d596bf8e61e13a627f6a972fac4762a70c1
-
SHA512
d90d80f0ad27d38e0e70079de3a090dfab41d07465be0031745fc60a3fd4303ea8b7e7b852a377838a4c159a65f9ed3fb2b49c4ba1f713fd1ddc09df77006b3e
Score10/10-
Deletes NTFS Change Journal
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
-
RansomEXX Ransomware
Targeted ransomware with variants which affect Windows and Linux systems.
-
Clears Windows event logs
-
Modifies boot configuration data using bcdedit
-
Disables use of System Restore points
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Overwrites deleted data with Cipher tool
Cipher is a Windows tool which be used to securely wipe deallocated HDD space, preventing recovery of deleted data.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-