General
-
Target
f973d9e1e4be678056cc402a8e72e474fcfca0799938fc89e0f6cdcf9203c0a2
-
Size
53KB
-
Sample
220211-g5g2yabgc4
-
MD5
d0422977806bae4cfe7d440920a0b00c
-
SHA1
3c92b7949783dd84ff86319b7780506cfc4e2853
-
SHA256
f973d9e1e4be678056cc402a8e72e474fcfca0799938fc89e0f6cdcf9203c0a2
-
SHA512
7bb49a62890d82006ab8fb99019aed1da6c611c52ec8f2aa885fdff67352ce47c9b2c748592e3673882a7733fe396f202d13a46e006fa3d32ccdbd27920119ad
Static task
static1
Behavioral task
behavioral1
Sample
f973d9e1e4be678056cc402a8e72e474fcfca0799938fc89e0f6cdcf9203c0a2.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f973d9e1e4be678056cc402a8e72e474fcfca0799938fc89e0f6cdcf9203c0a2.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\how_to_back_files.html
Extracted
C:\how_to_back_files.html
Targets
-
-
Target
f973d9e1e4be678056cc402a8e72e474fcfca0799938fc89e0f6cdcf9203c0a2
-
Size
53KB
-
MD5
d0422977806bae4cfe7d440920a0b00c
-
SHA1
3c92b7949783dd84ff86319b7780506cfc4e2853
-
SHA256
f973d9e1e4be678056cc402a8e72e474fcfca0799938fc89e0f6cdcf9203c0a2
-
SHA512
7bb49a62890d82006ab8fb99019aed1da6c611c52ec8f2aa885fdff67352ce47c9b2c748592e3673882a7733fe396f202d13a46e006fa3d32ccdbd27920119ad
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-