General
-
Target
thanos-cleaned.exe
-
Size
92KB
-
Sample
211104-r2dv8agha4
-
MD5
fe7dcc0f74e152a78963d560b2e3d148
-
SHA1
f9cf1dd1a7e8b2dffc9e0195685cef5a625832ea
-
SHA256
6a5090762c6058bc223e37e89f53832faad80995e3c5ed7e59ed9f5a5e604e47
-
SHA512
a1d2de8abf7e56a2c29bfa38d0ae23584db2174ec8b14c6da3220e1c52ad52861714f8c363be843d16cdf13a22e0b74c16a1cb684ba102f132b09133338a169a
Static task
static1
Behavioral task
behavioral1
Sample
thanos-cleaned.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
thanos-cleaned.exe
Resource
win10-en-20210920
Malware Config
Targets
-
-
Target
thanos-cleaned.exe
-
Size
92KB
-
MD5
fe7dcc0f74e152a78963d560b2e3d148
-
SHA1
f9cf1dd1a7e8b2dffc9e0195685cef5a625832ea
-
SHA256
6a5090762c6058bc223e37e89f53832faad80995e3c5ed7e59ed9f5a5e604e47
-
SHA512
a1d2de8abf7e56a2c29bfa38d0ae23584db2174ec8b14c6da3220e1c52ad52861714f8c363be843d16cdf13a22e0b74c16a1cb684ba102f132b09133338a169a
Score10/10-
Modifies WinLogon for persistence
-
Modifies boot configuration data using bcdedit
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Modifies WinLogon
-