General
-
Target
f261d0283d9f1e346a648537b859570741c52be11b95e527a108037d71363327
-
Size
133KB
-
Sample
211029-pf6m1aaabk
-
MD5
91b493febfc1d782875a09fc076a8850
-
SHA1
ed12cfbedc90181e869fce19dc820063fa6b3179
-
SHA256
f261d0283d9f1e346a648537b859570741c52be11b95e527a108037d71363327
-
SHA512
bb66d4d65f8f615e6af06f4815233a2a7430373e4afc5a61a2b2fff0dc9a6a002b4edad0db2a336b24dabd65efc3b74f57985836d137f25eb87a1901cfa4b9a9
Static task
static1
Behavioral task
behavioral1
Sample
f261d0283d9f1e346a648537b859570741c52be11b95e527a108037d71363327.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
f261d0283d9f1e346a648537b859570741c52be11b95e527a108037d71363327.exe
Resource
win10-en-20211014
Malware Config
Targets
-
-
Target
f261d0283d9f1e346a648537b859570741c52be11b95e527a108037d71363327
-
Size
133KB
-
MD5
91b493febfc1d782875a09fc076a8850
-
SHA1
ed12cfbedc90181e869fce19dc820063fa6b3179
-
SHA256
f261d0283d9f1e346a648537b859570741c52be11b95e527a108037d71363327
-
SHA512
bb66d4d65f8f615e6af06f4815233a2a7430373e4afc5a61a2b2fff0dc9a6a002b4edad0db2a336b24dabd65efc3b74f57985836d137f25eb87a1901cfa4b9a9
Score8/10-
Downloads MZ/PE file
-
Downloads PsExec from SysInternals website
Sysinternals tools like PsExec are often leveraged maliciously by malware families due to being commonly used by testers/administrators.
-
Modifies Windows Firewall
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Modifies WinLogon
-