General
-
Target
4b5fe7497864d07f78af15fa3e1aa3702b303b89f9644624871d83dd0f484749
-
Size
139KB
-
Sample
220128-z1fbnaeae9
-
MD5
24275604649ac0abafe99b981b914fbc
-
SHA1
818b0e3018ad27be9887e9e5f4ef1971f422652c
-
SHA256
4b5fe7497864d07f78af15fa3e1aa3702b303b89f9644624871d83dd0f484749
-
SHA512
008ef045724963d6ae3b845a6c3de8ebb6682b0f4b8ea77c2d35e2193596b78f0092183de0a88a34f7dde4e71abbc129b2f0f00fd8469801fff66f1b8390b6c8
Static task
static1
Behavioral task
behavioral1
Sample
4b5fe7497864d07f78af15fa3e1aa3702b303b89f9644624871d83dd0f484749.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
4b5fe7497864d07f78af15fa3e1aa3702b303b89f9644624871d83dd0f484749.exe
Resource
win10-en-20211208
Malware Config
Extracted
C:\ANEIQINBWA-DECRYPT.txt
http://gandcrabmfe6mnef.onion/e0a0248f202c7c5c
Extracted
C:\LJPFHZQNS-DECRYPT.txt
http://gandcrabmfe6mnef.onion/db375b7925fb4cb7
Targets
-
-
Target
4b5fe7497864d07f78af15fa3e1aa3702b303b89f9644624871d83dd0f484749
-
Size
139KB
-
MD5
24275604649ac0abafe99b981b914fbc
-
SHA1
818b0e3018ad27be9887e9e5f4ef1971f422652c
-
SHA256
4b5fe7497864d07f78af15fa3e1aa3702b303b89f9644624871d83dd0f484749
-
SHA512
008ef045724963d6ae3b845a6c3de8ebb6682b0f4b8ea77c2d35e2193596b78f0092183de0a88a34f7dde4e71abbc129b2f0f00fd8469801fff66f1b8390b6c8
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-