General
-
Target
makop_nowin.exe_
-
Size
34KB
-
Sample
211020-lmx3nagha5
-
MD5
5bcf1a6a65d8d0d2ad1c2a78935322b5
-
SHA1
c5af15f8170e3840ba756397cb1548fa9489fae9
-
SHA256
3b15b66bf6a7d7ebab6437906686037f23a797d15e0fbff3d6741d3f58db8f1e
-
SHA512
f21e3bc29b60d3ed248dd048774823d013beb43f2fcf7e560774f1987dc07ff42de2fb68a8dd3bad0653a8587cca9b9f18e0671342c81d8c5698b97a135eb639
Static task
static1
Behavioral task
behavioral1
Sample
makop_nowin.exe_.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
makop_nowin.exe_.exe
Resource
win10-en-20211014
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\074127051\readme-warning.txt
makop
coleman.dec@tutanota.com
lauracc@msgsafe.io
Targets
-
-
Target
makop_nowin.exe_
-
Size
34KB
-
MD5
5bcf1a6a65d8d0d2ad1c2a78935322b5
-
SHA1
c5af15f8170e3840ba756397cb1548fa9489fae9
-
SHA256
3b15b66bf6a7d7ebab6437906686037f23a797d15e0fbff3d6741d3f58db8f1e
-
SHA512
f21e3bc29b60d3ed248dd048774823d013beb43f2fcf7e560774f1987dc07ff42de2fb68a8dd3bad0653a8587cca9b9f18e0671342c81d8c5698b97a135eb639
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Legitimate hosting services abused for malware hosting/C2
-