General
-
Target
1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample
-
Size
5.4MB
-
Sample
211130-qrtm9afafl
-
MD5
bf8dafaedf5b031ba01200e2ec608f96
-
SHA1
3e6689dc6a8a717b4114a7fe65bba594c597c7b9
-
SHA256
1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b
-
SHA512
625535d71b2ca8a547924f08357eda1dc1d669b6c4ae1d0a436af1435fb9af58f24b63cde71588cee1785e36bb950c8c412db9c1e0541e65d11f2a13955fe7f6
Static task
static1
Behavioral task
behavioral1
Sample
1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample.exe
Resource
win10-en-20211014
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\!TXDOT_READ_ME!.txt
Targets
-
-
Target
1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b.bin.sample
-
Size
5.4MB
-
MD5
bf8dafaedf5b031ba01200e2ec608f96
-
SHA1
3e6689dc6a8a717b4114a7fe65bba594c597c7b9
-
SHA256
1699dd3b24dd5a405449a60f94b0043731deaa749d4899f2f927d913c624895b
-
SHA512
625535d71b2ca8a547924f08357eda1dc1d669b6c4ae1d0a436af1435fb9af58f24b63cde71588cee1785e36bb950c8c412db9c1e0541e65d11f2a13955fe7f6
Score10/10-
Deletes NTFS Change Journal
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
-
RansomEXX Ransomware
Targeted ransomware with variants which affect Windows and Linux systems.
-
Clears Windows event logs
-
Modifies boot configuration data using bcdedit
-
Disables use of System Restore points
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Overwrites deleted data with Cipher tool
Cipher is a Windows tool which be used to securely wipe deallocated HDD space, preventing recovery of deleted data.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-