General
-
Target
75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942
-
Size
1.0MB
-
Sample
220306-exj58aaaa5
-
MD5
c4c8e242b5025104c6f85cb2d2c6f355
-
SHA1
604429eb08ef616d6d0693aa5c208bafb67973f7
-
SHA256
75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942
-
SHA512
3f4c1052a3d57b5d806558e73dc4597f53a64d86e7f49e3ae7c8b18c8965e013b3717b3d71d0a95824c3233feb3ffae0fcc7733493662c31f0e7da9eac1cb606
Static task
static1
Behavioral task
behavioral1
Sample
75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\498446043\readme-warning.txt
makop
Targets
-
-
Target
75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942
-
Size
1.0MB
-
MD5
c4c8e242b5025104c6f85cb2d2c6f355
-
SHA1
604429eb08ef616d6d0693aa5c208bafb67973f7
-
SHA256
75af67f9b9a4a7e7f0b8e88c67143175676a3e742370b7655c8671ca6e591942
-
SHA512
3f4c1052a3d57b5d806558e73dc4597f53a64d86e7f49e3ae7c8b18c8965e013b3717b3d71d0a95824c3233feb3ffae0fcc7733493662c31f0e7da9eac1cb606
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-