General
-
Target
491682e4990a7cca7b5ea6d82fe56cb030023a5a497a9a73a733ac89ea5c68c7
-
Size
50KB
-
Sample
220211-hrx2nsdgck
-
MD5
656ee1e1c5e105e256835db00b7c6e2d
-
SHA1
6f5340a175ea4b285787b38575a0073cd30af79f
-
SHA256
491682e4990a7cca7b5ea6d82fe56cb030023a5a497a9a73a733ac89ea5c68c7
-
SHA512
30f22b2fd87e8fee932fc435762d210afb5cec1b694782f874d893da230f838e45e633999a1cc503b68816ca5f811d06685f2c050bf7a2da68eb23bfcbe74806
Static task
static1
Behavioral task
behavioral1
Sample
491682e4990a7cca7b5ea6d82fe56cb030023a5a497a9a73a733ac89ea5c68c7.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
491682e4990a7cca7b5ea6d82fe56cb030023a5a497a9a73a733ac89ea5c68c7.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\HOW_TO_BACK_FILES.txt
Extracted
C:\HOW_TO_BACK_FILES.txt
Targets
-
-
Target
491682e4990a7cca7b5ea6d82fe56cb030023a5a497a9a73a733ac89ea5c68c7
-
Size
50KB
-
MD5
656ee1e1c5e105e256835db00b7c6e2d
-
SHA1
6f5340a175ea4b285787b38575a0073cd30af79f
-
SHA256
491682e4990a7cca7b5ea6d82fe56cb030023a5a497a9a73a733ac89ea5c68c7
-
SHA512
30f22b2fd87e8fee932fc435762d210afb5cec1b694782f874d893da230f838e45e633999a1cc503b68816ca5f811d06685f2c050bf7a2da68eb23bfcbe74806
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-