General
-
Target
bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb
-
Size
36KB
-
Sample
220131-3tyffaeca7
-
MD5
644b931e6a016a6146ebe8068f68e4cb
-
SHA1
87e2ad3e9f1ae9e1340fb3c70013fd6b508e2364
-
SHA256
bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb
-
SHA512
683152462a60d24dd9151754ebc5184a4753afbfeb4a86f74d5d815ae1d3738631bd8f89c51fe56b31ddc14a590579233a0a1a5562ba49e5486387be3bb989ba
Behavioral task
behavioral1
Sample
bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\NEFILIM-DECRYPT.txt
Targets
-
-
Target
bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb
-
Size
36KB
-
MD5
644b931e6a016a6146ebe8068f68e4cb
-
SHA1
87e2ad3e9f1ae9e1340fb3c70013fd6b508e2364
-
SHA256
bc1b0daa577dc2cc96cc24512d13267773d0b6c8ce0e768db41aa0ec00f128eb
-
SHA512
683152462a60d24dd9151754ebc5184a4753afbfeb4a86f74d5d815ae1d3738631bd8f89c51fe56b31ddc14a590579233a0a1a5562ba49e5486387be3bb989ba
Score10/10-
Nefilim
Ransomware first seen in early 2020 which shares code with the Nemty family. Rewritten in Golang in July 2020.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-