General
-
Target
5b56c5d86347e164c6e571c86dbf5b1535eae6b979fede6ed66b01e79ea33b7b.zip
-
Size
212KB
-
Sample
220316-jnml7safg8
-
MD5
f62feba069adc867afa50b3affeff7d0
-
SHA1
5fbb62212f1344736f647e61b5ccc4b5a2b16e10
-
SHA256
5222785d721ce9f856d31d7088406589c3afe28256bef0a6fb6214aa8962b722
-
SHA512
d4fa8448d2eb5c2468e212eab0bba86daaa384e242e418470426e0173ee6fa67d2ff0e9cd9963b21efd00afab19ffc8a0430e34271a78adf762f8d2a4950f823
Static task
static1
Behavioral task
behavioral1
Sample
5b56c5d86347e164c6e571c86dbf5b1535eae6b979fede6ed66b01e79ea33b7b.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
5b56c5d86347e164c6e571c86dbf5b1535eae6b979fede6ed66b01e79ea33b7b.exe
Resource
win10v2004-20220310-en
Malware Config
Extracted
C:\Restore_My_Files.txt
http://vbfqeh5nugm6r2u2qvghsdxm3fotf5wbxb5ltv6vw77vus5frdpuaiid.onion*
Targets
-
-
Target
5b56c5d86347e164c6e571c86dbf5b1535eae6b979fede6ed66b01e79ea33b7b.exe
-
Size
218KB
-
MD5
0c4a84b66832a08dccc42b478d9d5e1b
-
SHA1
160320b920a5ef22ac17b48146152ffbef60461f
-
SHA256
5b56c5d86347e164c6e571c86dbf5b1535eae6b979fede6ed66b01e79ea33b7b
-
SHA512
56e4b07baca1c4c82e518088cc713b97eb2aa4e096d39bd7076396e075621bc47a20fd6a65fb897dc974d77c01f242a872532136d4bd3097a57c4664d8430872
Score10/10-
Modifies Installed Components in the registry
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-