General
-
Target
dd286a4d79d0f4c2b906073c7f46680252ca09c1c39b0dc12c92097c56662876.zip
-
Size
1.8MB
-
Sample
220430-dyagqsegh8
-
MD5
baafe4e67ea321abb34d8352753da9a8
-
SHA1
d31054b45f730b04d10d6a9039d953c644a46b8b
-
SHA256
0eb47cce8acbc742dd9d8e73a3c48411c13bdb03d99dfbeafe1ddcb453626f8f
-
SHA512
5e7dfbac78ff5b9d07b6041369344281338d29d381fef2b87d20c7e529197a499a963186ede6be32f8b85e9b0211b679d1e82c6062c5cd99965b3c4be263c9ca
Behavioral task
behavioral1
Sample
dd286a4d79d0f4c2b906073c7f46680252ca09c1c39b0dc12c92097c56662876.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
zebrocy
Windows XP Professional x64 Edition
Targets
-
-
Target
dd286a4d79d0f4c2b906073c7f46680252ca09c1c39b0dc12c92097c56662876.exe
-
Size
1.8MB
-
MD5
057aad993a3ef50f6b3ca2db37cb928a
-
SHA1
a57592be641738c86c85308ef68148181249bc0b
-
SHA256
dd286a4d79d0f4c2b906073c7f46680252ca09c1c39b0dc12c92097c56662876
-
SHA512
87c89027d60f80e99c526584fa093620b3f099151170362424ad78f5e4d7184bd9f2d627ec8463ca202127835f435dd4f85bf2b0d9351593c688855f0bbaffbb
Score10/10-
suricata: ET MALWARE Possible Satan Cryptor GeoIP Lookup
suricata: ET MALWARE Possible Satan Cryptor GeoIP Lookup
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Drops startup file
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-