Analysis
-
max time kernel
133s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
29-03-2022 14:45
Static task
static1
Behavioral task
behavioral1
Sample
vlc-3.0.16-win32.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
vlc-3.0.16-win32.exe
Resource
win10v2004-en-20220113
General
-
Target
vlc-3.0.16-win32.exe
-
Size
39.5MB
-
MD5
1bed0a495133dd4d6c9efaf7e71f8ef3
-
SHA1
a51a1d258b5cbcc93916b5eeb0d530f4b3bd94df
-
SHA256
4599f5d504c127f7e2ee391f06725461b9b761492c72ac2eb98f2429f04ef5c1
-
SHA512
837b68de2f66e91fba29c394e4c2e4b91d735e5f9433178e95d6dda50d6f49b5d9dae43832f331e8db40b3e24b876daa8a0303d8d9cd9a6d55e758fa644b3b05
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 1728 vlc-3.0.16-win32.exe 1728 vlc-3.0.16-win32.exe 1728 vlc-3.0.16-win32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD520850d4d5416fbfd6a02e8a120f360fc
SHA1ac34f3a34aaa4a21efd6a32bc93102639170e219
SHA256860b409b065b747aab2a9937f02d08b6fd7309993b50d8e4b53983c8c2b56b61
SHA512c8048b9ae0ced72a384c5ab781083a76b96ae08d5c8a5c7797f75a7e54e9cd9192349f185ee88c9cf0514fc8d59e37e01d88b9c8106321c0581659ebe1d1c276
-
Filesize
26KB
MD54f25d99bf1375fe5e61b037b2616695d
SHA1958fad0e54df0736ddab28ff6cb93e6ed580c862
SHA256803931797d95777248dee4f2a563aed51fe931d2dd28faec507c69ed0f26f647
SHA51296a8446f322cd62377a93d2088c0ce06087da27ef95a391e02c505fb4eb1d00419143d67d89494c2ef6f57ae2fd7f049c86e00858d1b193ec6dde4d0fe0e3130
-
Filesize
12KB
MD52029c44871670eec937d1a8c1e9faa21
SHA1e8d53b9e8bc475cc274d80d3836b526d8dd2747a
SHA256a4ae6d33f940a80e8fe34537c5cc1f8b8679c979607969320cfb750c15809ac2
SHA5126f151c9818ac2f3aef6d4cabd8122c7e22ccf0b84fa5d4bcc951f8c3d00e8c270127eac1e9d93c5f4594ac90de8aff87dc6e96562f532a3d19c0da63a28654b7