General
-
Target
627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb
-
Size
220KB
-
Sample
220504-xkbmesedd4
-
MD5
adc3438992114c797a33b0a2ed415185
-
SHA1
568979d0548bef3a113fd03f75b6d1c64aa4e0d9
-
SHA256
627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb
-
SHA512
1f3d7551ee1621641b98da20dbc6444e6845af5fdc63f04339c5ab4a5d57fe12465e328edc91fd57c87c9ce64da89a0c8cbf155d0a3214d9a03c395812bfebf0
Static task
static1
Behavioral task
behavioral1
Sample
627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Restore_My_Files.txt
http://vbfqeh5nugm6r2u2qvghsdxm3fotf5wbxb5ltv6vw77vus5frdpuaiid.onion*
Targets
-
-
Target
627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb
-
Size
220KB
-
MD5
adc3438992114c797a33b0a2ed415185
-
SHA1
568979d0548bef3a113fd03f75b6d1c64aa4e0d9
-
SHA256
627ede421ee51a7153ee896f657169665c1e9f79ef0ba4af1f6450d816900cbb
-
SHA512
1f3d7551ee1621641b98da20dbc6444e6845af5fdc63f04339c5ab4a5d57fe12465e328edc91fd57c87c9ce64da89a0c8cbf155d0a3214d9a03c395812bfebf0
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-