General
-
Target
704a0fa7de19564bc743fb68aa0652e38bf86e8ab694bc079b15f945c85f4320
-
Size
38KB
-
Sample
220305-t4g2rsgfg3
-
MD5
8b9a0b44b738c7884e6a14f4cb18afff
-
SHA1
9d9c33493aa0e1a12efe472e7cfc74bebec9a270
-
SHA256
704a0fa7de19564bc743fb68aa0652e38bf86e8ab694bc079b15f945c85f4320
-
SHA512
727ead654637728a3addc1e8004d1f86174918f77137ef49af970e480567a3295c40b9aa6b1f8bb8e1b23708db852f7aec4742acc0d8b14ab18e73aa58fd6d0e
Static task
static1
Behavioral task
behavioral1
Sample
704a0fa7de19564bc743fb68aa0652e38bf86e8ab694bc079b15f945c85f4320.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
704a0fa7de19564bc743fb68aa0652e38bf86e8ab694bc079b15f945c85f4320.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\MSOCache\How To Restore Your Files.txt
http://babukq4e2p4wu4iq.onion/login.php?id=p9gFgBg5TsdcO3mV9mf2RJlJoI0iy1
Targets
-
-
Target
704a0fa7de19564bc743fb68aa0652e38bf86e8ab694bc079b15f945c85f4320
-
Size
38KB
-
MD5
8b9a0b44b738c7884e6a14f4cb18afff
-
SHA1
9d9c33493aa0e1a12efe472e7cfc74bebec9a270
-
SHA256
704a0fa7de19564bc743fb68aa0652e38bf86e8ab694bc079b15f945c85f4320
-
SHA512
727ead654637728a3addc1e8004d1f86174918f77137ef49af970e480567a3295c40b9aa6b1f8bb8e1b23708db852f7aec4742acc0d8b14ab18e73aa58fd6d0e
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-