General
-
Target
d33b09ddee82c5c439cb0c66e5c1dee9ad5259e912a3979b31c66622fb9d47ea
-
Size
654KB
-
Sample
220201-sv5k2ahae6
-
MD5
ad182ac22ee9e8075a324fcee2038108
-
SHA1
212e3254099967712c6690be11ae9d65a8966ffa
-
SHA256
d33b09ddee82c5c439cb0c66e5c1dee9ad5259e912a3979b31c66622fb9d47ea
-
SHA512
51aac8b10246f8ce9d3dbe34aaac2de1801b3fb121450dd00c6eb27b109d79cd931700becdcf5194c5f1316c39e91cda9c244abcc8772deea9d2da2519a1c838
Static task
static1
Behavioral task
behavioral1
Sample
d33b09ddee82c5c439cb0c66e5c1dee9ad5259e912a3979b31c66622fb9d47ea.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
d33b09ddee82c5c439cb0c66e5c1dee9ad5259e912a3979b31c66622fb9d47ea.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
\??\Z:\Boot\Recovery_Instructions.html
Extracted
\??\Z:\Boot\Recovery_Instructions.html
Targets
-
-
Target
d33b09ddee82c5c439cb0c66e5c1dee9ad5259e912a3979b31c66622fb9d47ea
-
Size
654KB
-
MD5
ad182ac22ee9e8075a324fcee2038108
-
SHA1
212e3254099967712c6690be11ae9d65a8966ffa
-
SHA256
d33b09ddee82c5c439cb0c66e5c1dee9ad5259e912a3979b31c66622fb9d47ea
-
SHA512
51aac8b10246f8ce9d3dbe34aaac2de1801b3fb121450dd00c6eb27b109d79cd931700becdcf5194c5f1316c39e91cda9c244abcc8772deea9d2da2519a1c838
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Sets service image path in registry
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-