General
-
Target
ebdc5309aeef56b4bb2ffc14ac4fd618ffaae294e633099532a20992908ab4ea
-
Size
121KB
-
Sample
220503-sc2fnahgb4
-
MD5
2a1eba690d97ef43558414530e7d2dac
-
SHA1
48b6a01525f745c863d8302339340528a9f44775
-
SHA256
ebdc5309aeef56b4bb2ffc14ac4fd618ffaae294e633099532a20992908ab4ea
-
SHA512
29b663f495a051ed614375caeeb3b8284df620f6460f451a72af68d35413326a31243300aef8854a60531ab7c8c240d74fb2cd0e32928c0f0bbef0e2b9447280
Static task
static1
Behavioral task
behavioral1
Sample
ebdc5309aeef56b4bb2ffc14ac4fd618ffaae294e633099532a20992908ab4ea.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ebdc5309aeef56b4bb2ffc14ac4fd618ffaae294e633099532a20992908ab4ea.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\1798133593\readme-warning.txt
makop
Targets
-
-
Target
ebdc5309aeef56b4bb2ffc14ac4fd618ffaae294e633099532a20992908ab4ea
-
Size
121KB
-
MD5
2a1eba690d97ef43558414530e7d2dac
-
SHA1
48b6a01525f745c863d8302339340528a9f44775
-
SHA256
ebdc5309aeef56b4bb2ffc14ac4fd618ffaae294e633099532a20992908ab4ea
-
SHA512
29b663f495a051ed614375caeeb3b8284df620f6460f451a72af68d35413326a31243300aef8854a60531ab7c8c240d74fb2cd0e32928c0f0bbef0e2b9447280
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-