General
-
Target
file000_spoolcv.exe
-
Size
400KB
-
Sample
211115-sbkrhsaff3
-
MD5
e6688d5a1565053e114263a98daca7de
-
SHA1
eb9c95ee5c0835406e27478099020ac1eee2c479
-
SHA256
f4dbc868579e467f9e05766f67497ae6d8f4b3be91165d40df4a18ec912e5e89
-
SHA512
c152cf41b58017466823e3d329265fb0dcf82fde8751587799d678ae46ab3745190d1e3686ecb97106abbd0990786eea90afe70b6ee10951b209f1e00583b9db
Static task
static1
Behavioral task
behavioral1
Sample
file000_spoolcv.exe
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
file000_spoolcv.exe
Resource
win10-en-20211014
Malware Config
Extracted
C:\Users\Admin\Desktop\HELP_ME_RECOVER_MY_FILES.txt
hakbit
12grtxACJZkgT2nGAvMesgoM4ADHJ6NTaW
Extracted
C:\Users\Admin\Desktop\HELP_ME_RECOVER_MY_FILES.txt
hakbit
12grtxACJZkgT2nGAvMesgoM4ADHJ6NTaW
Targets
-
-
Target
file000_spoolcv.exe
-
Size
400KB
-
MD5
e6688d5a1565053e114263a98daca7de
-
SHA1
eb9c95ee5c0835406e27478099020ac1eee2c479
-
SHA256
f4dbc868579e467f9e05766f67497ae6d8f4b3be91165d40df4a18ec912e5e89
-
SHA512
c152cf41b58017466823e3d329265fb0dcf82fde8751587799d678ae46ab3745190d1e3686ecb97106abbd0990786eea90afe70b6ee10951b209f1e00583b9db
Score10/10-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Drops startup file
-