General
-
Target
d85f4448d5aea240d68c07bec6f363986d71940c3c1a3e49053d55fd1741c41e.bin.sample
-
Size
156KB
-
Sample
211130-qr2c4aabh6
-
MD5
b36c45a9548330108c3e5731607eb7fb
-
SHA1
24e773aa271fc0636cda6b0966a6034b65cb3052
-
SHA256
d85f4448d5aea240d68c07bec6f363986d71940c3c1a3e49053d55fd1741c41e
-
SHA512
1bdb0b3772057cef466e496d5f1bf248fde7337d4bc8bf1ce94a1b56eafed3f83d82b1bc9c607c055641a303f604689297f8aa1c53e33568de0d455a07950889
Static task
static1
Behavioral task
behavioral1
Sample
d85f4448d5aea240d68c07bec6f363986d71940c3c1a3e49053d55fd1741c41e.bin.sample.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
d85f4448d5aea240d68c07bec6f363986d71940c3c1a3e49053d55fd1741c41e.bin.sample.exe
Resource
win10-en-20211104
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\!TXDOT_READ_ME!.txt
Targets
-
-
Target
d85f4448d5aea240d68c07bec6f363986d71940c3c1a3e49053d55fd1741c41e.bin.sample
-
Size
156KB
-
MD5
b36c45a9548330108c3e5731607eb7fb
-
SHA1
24e773aa271fc0636cda6b0966a6034b65cb3052
-
SHA256
d85f4448d5aea240d68c07bec6f363986d71940c3c1a3e49053d55fd1741c41e
-
SHA512
1bdb0b3772057cef466e496d5f1bf248fde7337d4bc8bf1ce94a1b56eafed3f83d82b1bc9c607c055641a303f604689297f8aa1c53e33568de0d455a07950889
Score10/10-
Deletes NTFS Change Journal
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
-
RansomEXX Ransomware
Targeted ransomware with variants which affect Windows and Linux systems.
-
Clears Windows event logs
-
Modifies boot configuration data using bcdedit
-
Disables use of System Restore points
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Overwrites deleted data with Cipher tool
Cipher is a Windows tool which be used to securely wipe deallocated HDD space, preventing recovery of deleted data.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-