General
-
Target
e43fb62c12fcf1be9f9982e81a59350a8f9dd2389198c0b332cef832a63aac0f
-
Size
1.0MB
-
Sample
220201-drne1sgde3
-
MD5
8a714ad99ae5dbd5fd8432efafb5b8e6
-
SHA1
d8418df846e93da657312acd64a671887e8d0fa7
-
SHA256
e43fb62c12fcf1be9f9982e81a59350a8f9dd2389198c0b332cef832a63aac0f
-
SHA512
6e2ac0700043e41e9dcd47ad17b28db32085dd6d1674d7481d3bfa0c9f3d48a79dcc02fa31f09c22aa01e5ba7a9d6778c5aec4a11196bada2b0256a46a28fd58
Static task
static1
Behavioral task
behavioral1
Sample
e43fb62c12fcf1be9f9982e81a59350a8f9dd2389198c0b332cef832a63aac0f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
e43fb62c12fcf1be9f9982e81a59350a8f9dd2389198c0b332cef832a63aac0f.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\README1.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README2.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README3.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README4.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README5.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README6.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README7.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README8.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README9.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README10.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Targets
-
-
Target
e43fb62c12fcf1be9f9982e81a59350a8f9dd2389198c0b332cef832a63aac0f
-
Size
1.0MB
-
MD5
8a714ad99ae5dbd5fd8432efafb5b8e6
-
SHA1
d8418df846e93da657312acd64a671887e8d0fa7
-
SHA256
e43fb62c12fcf1be9f9982e81a59350a8f9dd2389198c0b332cef832a63aac0f
-
SHA512
6e2ac0700043e41e9dcd47ad17b28db32085dd6d1674d7481d3bfa0c9f3d48a79dcc02fa31f09c22aa01e5ba7a9d6778c5aec4a11196bada2b0256a46a28fd58
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-