General
-
Target
ea953cb3c4858e971dc4d75a2a11a6d0af42af36c0cad9c3f1e08d4c6e5f2ef8
-
Size
2.8MB
-
Sample
220113-qqwffsaea2
-
MD5
ee865b4d3cfd296ea7cc70f7feaf024c
-
SHA1
4dbc37b09a0c622aadda3aa8e802d3be4d226eec
-
SHA256
ea953cb3c4858e971dc4d75a2a11a6d0af42af36c0cad9c3f1e08d4c6e5f2ef8
-
SHA512
2bfc0a6d17d126a51fc97def2da34c98c4dc7bbc118494d40994c29ee5477522944a7cdcfb0f044e8eaf58ebf65c14f8bc1022deca187e3a9352e89a9dce4eca
Static task
static1
Behavioral task
behavioral1
Sample
ea953cb3c4858e971dc4d75a2a11a6d0af42af36c0cad9c3f1e08d4c6e5f2ef8.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ea953cb3c4858e971dc4d75a2a11a6d0af42af36c0cad9c3f1e08d4c6e5f2ef8.exe
Resource
win10-en-20211208
Malware Config
Extracted
C:\Program Files\7-Zip\mpYx_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Targets
-
-
Target
ea953cb3c4858e971dc4d75a2a11a6d0af42af36c0cad9c3f1e08d4c6e5f2ef8
-
Size
2.8MB
-
MD5
ee865b4d3cfd296ea7cc70f7feaf024c
-
SHA1
4dbc37b09a0c622aadda3aa8e802d3be4d226eec
-
SHA256
ea953cb3c4858e971dc4d75a2a11a6d0af42af36c0cad9c3f1e08d4c6e5f2ef8
-
SHA512
2bfc0a6d17d126a51fc97def2da34c98c4dc7bbc118494d40994c29ee5477522944a7cdcfb0f044e8eaf58ebf65c14f8bc1022deca187e3a9352e89a9dce4eca
-
Modifies security service
-
Clears Windows event logs
-
Modifies boot configuration data using bcdedit
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-