General
-
Target
c540c9b5b467d575f46433b78237f6e1
-
Size
109KB
-
Sample
211226-frz5xsbbg9
-
MD5
c540c9b5b467d575f46433b78237f6e1
-
SHA1
93dd622dc1268f598a47fe7c75efbce355097b98
-
SHA256
5f5d1f324ed8dc18d76f200a176d40ab2ae48e336f33c2f7b5d047d682f3260a
-
SHA512
29776896e4e5eef318389c3b618afe1a1ccb83e4eb41c42bcb108576a50953d760696bcf7531331678e00284a2d0320dba553070a2e0cc3bd7896802e82c9190
Static task
static1
Behavioral task
behavioral1
Sample
c540c9b5b467d575f46433b78237f6e1.exe
Resource
win7-en-20211208
Malware Config
Extracted
C:\Windows\tasks\readme-warning.txt
https://tox.chat/
Targets
-
-
Target
c540c9b5b467d575f46433b78237f6e1
-
Size
109KB
-
MD5
c540c9b5b467d575f46433b78237f6e1
-
SHA1
93dd622dc1268f598a47fe7c75efbce355097b98
-
SHA256
5f5d1f324ed8dc18d76f200a176d40ab2ae48e336f33c2f7b5d047d682f3260a
-
SHA512
29776896e4e5eef318389c3b618afe1a1ccb83e4eb41c42bcb108576a50953d760696bcf7531331678e00284a2d0320dba553070a2e0cc3bd7896802e82c9190
-
MAKOP ransomware payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-