General
-
Target
e55fcf9315c52d2abd3431f7e4bb82cbd2b0d24d124e0e1a27b951030b2de162
-
Size
156KB
-
Sample
210820-x71w644rzn
-
MD5
ca2326886fa699068c44f32b3e51adaf
-
SHA1
3555aaebe6c113fb8f923a38cb3bd75da6e86277
-
SHA256
e55fcf9315c52d2abd3431f7e4bb82cbd2b0d24d124e0e1a27b951030b2de162
-
SHA512
d7da00f22fede4909c29d5c6125f2b5749453cefa65c262133d50cf7235fc9d3b134e5b2d5740f08e8db3fc70c21de8bed42deb84a5ca31108a7968026b7ed9e
Static task
static1
Behavioral task
behavioral1
Sample
e55fcf9315c52d2abd3431f7e4bb82cbd2b0d24d124e0e1a27b951030b2de162.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
e55fcf9315c52d2abd3431f7e4bb82cbd2b0d24d124e0e1a27b951030b2de162.exe
Resource
win10v20210408
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\!TXDOT_READ_ME!.txt
Extracted
C:\Users\Admin\Documents\!TXDOT_READ_ME!.txt
Targets
-
-
Target
e55fcf9315c52d2abd3431f7e4bb82cbd2b0d24d124e0e1a27b951030b2de162
-
Size
156KB
-
MD5
ca2326886fa699068c44f32b3e51adaf
-
SHA1
3555aaebe6c113fb8f923a38cb3bd75da6e86277
-
SHA256
e55fcf9315c52d2abd3431f7e4bb82cbd2b0d24d124e0e1a27b951030b2de162
-
SHA512
d7da00f22fede4909c29d5c6125f2b5749453cefa65c262133d50cf7235fc9d3b134e5b2d5740f08e8db3fc70c21de8bed42deb84a5ca31108a7968026b7ed9e
Score10/10-
Deletes NTFS Change Journal
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
-
RansomEXX Ransomware
Targeted ransomware with variants which affect Windows and Linux systems.
-
Clears Windows event logs
-
Modifies boot configuration data using bcdedit
-
Disables use of System Restore points
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Overwrites deleted data with Cipher tool
Cipher is a Windows tool which be used to securely wipe deallocated HDD space, preventing recovery of deleted data.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-