General
-
Target
1.dll
-
Size
901KB
-
Sample
220302-qwslraggan
-
MD5
8371d1c15af2ffa8111deef437997d79
-
SHA1
d4b427988b2876546c2e00329ac1b9ba3905c9b8
-
SHA256
37410f45bab40e0d5e8e2160b480d928c975fadbe423be884678b924d66871d2
-
SHA512
d09c4b72f2f9219d12cb2735a835382b1fb5c4e0f8487a5b025494a7576780c893e48f713b5986d93328fe92642ca47794d1fca95cf65c1cb1835daab17db23a
Static task
static1
Behavioral task
behavioral1
Sample
1.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
1.dll
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\readme.txt
conti
http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/
https://contirecovery.ws
Targets
-
-
Target
1.dll
-
Size
901KB
-
MD5
8371d1c15af2ffa8111deef437997d79
-
SHA1
d4b427988b2876546c2e00329ac1b9ba3905c9b8
-
SHA256
37410f45bab40e0d5e8e2160b480d928c975fadbe423be884678b924d66871d2
-
SHA512
d09c4b72f2f9219d12cb2735a835382b1fb5c4e0f8487a5b025494a7576780c893e48f713b5986d93328fe92642ca47794d1fca95cf65c1cb1835daab17db23a
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Drops desktop.ini file(s)
-