General
-
Target
svchost.exe
-
Size
272KB
-
Sample
210830-yrelqgrq7a
-
MD5
35ebfdabce6eac99d7849916182486d1
-
SHA1
ea77ddfb8947e5145928937170e8eb29973d05fd
-
SHA256
84d9ef8cb92d57b178cce655f3f7808c6f5cf42f15c468f741b253f37ffc39fc
-
SHA512
ea7e7303fa17634c635fa7f0f9a3c3957c52f74bd871d98c54df9ebb1237fa917c6b09293327b815c9793e9374a6d4b92342fc8c0b5f80954797b77ebaa158c6
Static task
static1
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
svchost.exe
Resource
win10v20210408
Malware Config
Extracted
C:\Restore-My-Files.txt
lockbit
Extracted
C:\Users\Admin\AppData\Local\Temp\info.hta
Extracted
C:\Restore-My-Files.txt
lockbit
Extracted
C:\Users\Admin\AppData\Local\Temp\info.hta
Targets
-
-
Target
svchost.exe
-
Size
272KB
-
MD5
35ebfdabce6eac99d7849916182486d1
-
SHA1
ea77ddfb8947e5145928937170e8eb29973d05fd
-
SHA256
84d9ef8cb92d57b178cce655f3f7808c6f5cf42f15c468f741b253f37ffc39fc
-
SHA512
ea7e7303fa17634c635fa7f0f9a3c3957c52f74bd871d98c54df9ebb1237fa917c6b09293327b815c9793e9374a6d4b92342fc8c0b5f80954797b77ebaa158c6
Score10/10-
Modifies Windows Firewall
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Drops desktop.ini file(s)
-
Sets desktop wallpaper using registry
-