General
-
Target
8f5be0af938a91d520c9ad6454e4eb8e562d236c6cdaae9cecfe04b28e37f857
-
Size
112KB
-
Sample
220205-z96j7sfgep
-
MD5
65977152d62265c0f46751874bd45767
-
SHA1
3b6aaf8ab4eb82062780202248aad45b916376ab
-
SHA256
8f5be0af938a91d520c9ad6454e4eb8e562d236c6cdaae9cecfe04b28e37f857
-
SHA512
c36f317b7229139f9abaa1cf17b50699d3cab630b95d2fb9b59960c14d2843484378c60bd28bf841f229d23b889e180c278f007fd088948e2535e38cb2a782bb
Static task
static1
Behavioral task
behavioral1
Sample
8f5be0af938a91d520c9ad6454e4eb8e562d236c6cdaae9cecfe04b28e37f857.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
8f5be0af938a91d520c9ad6454e4eb8e562d236c6cdaae9cecfe04b28e37f857.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt
http://decrypttozxybarc.onion/0C1C-257D-7431-0006-422B
Extracted
C:\Users\Admin\Downloads\# DECRYPT MY FILES #.txt
http://decrypttozxybarc.onion/865A-5B5E-921E-0006-4B9D
Targets
-
-
Target
8f5be0af938a91d520c9ad6454e4eb8e562d236c6cdaae9cecfe04b28e37f857
-
Size
112KB
-
MD5
65977152d62265c0f46751874bd45767
-
SHA1
3b6aaf8ab4eb82062780202248aad45b916376ab
-
SHA256
8f5be0af938a91d520c9ad6454e4eb8e562d236c6cdaae9cecfe04b28e37f857
-
SHA512
c36f317b7229139f9abaa1cf17b50699d3cab630b95d2fb9b59960c14d2843484378c60bd28bf841f229d23b889e180c278f007fd088948e2535e38cb2a782bb
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-