General
-
Target
50716abdde2a383ed8c5da0c10d7c42e52a0d1c7b38878f1b130d08e13d5c5a5
-
Size
34KB
-
Sample
220419-c3735abhb6
-
MD5
18881d488739f0fffa5f08c18d8a650d
-
SHA1
f1ad045b8d0a53c13cce1a18f1a2f59b5ca2dba9
-
SHA256
50716abdde2a383ed8c5da0c10d7c42e52a0d1c7b38878f1b130d08e13d5c5a5
-
SHA512
a0c303a37ad4dc56e938463003544bff50eddb8d13390d6890fe16a1d02b5e9f05a75cb5cf2cb0e6baad31514a025f7c07d8185f30facdff4051981524ecaf7c
Static task
static1
Behavioral task
behavioral1
Sample
Trojan.Ransom.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Trojan.Ransom.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\!satana!.txt
Targets
-
-
Target
Trojan.Ransom.Satana
-
Size
49KB
-
MD5
46bfd4f1d581d7c0121d2b19a005d3df
-
SHA1
5b063298bbd1670b4d39e1baef67f854b8dcba9d
-
SHA256
683a09da219918258c58a7f61f7dc4161a3a7a377cf82a31b840baabfb9a4a96
-
SHA512
b52aa090f689765d099689700be7e18922137e7a860a00113e3f72aa6553e94a870bbb741e52de9617506a236a2a59198fb224fcd128576d76642eec9d715df5
Score10/10-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-