General
-
Target
ef0b62c34bac3ea9c196ce4f96ac4aca30d91378dc465abf44a7871aa9e6775a
-
Size
30KB
-
Sample
220524-z4r5magdg2
-
MD5
910635e580fd5de4759968959f6d0bb4
-
SHA1
934fbaeebdfe9c7c5c21696bd4e288094c44eef0
-
SHA256
ef0b62c34bac3ea9c196ce4f96ac4aca30d91378dc465abf44a7871aa9e6775a
-
SHA512
76411000d85d8634e1efefd533fac7defb65a7278820c2df64c8b6eb6d92d03f382025afeb5e8a6e99f9de5b8b36a25106b279818c2221fae4c187c5774fd4be
Static task
static1
Behavioral task
behavioral1
Sample
ef0b62c34bac3ea9c196ce4f96ac4aca30d91378dc465abf44a7871aa9e6775a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ef0b62c34bac3ea9c196ce4f96ac4aca30d91378dc465abf44a7871aa9e6775a.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\Desktop\HIT BY RANSOMWARE.txt
Extracted
Protocol: smtp- Host:
mail.gmx.net - Port:
587 - Username:
[email protected] - Password:
q!]*zZ@aWs[d)9x^c<n[
Targets
-
-
Target
ef0b62c34bac3ea9c196ce4f96ac4aca30d91378dc465abf44a7871aa9e6775a
-
Size
30KB
-
MD5
910635e580fd5de4759968959f6d0bb4
-
SHA1
934fbaeebdfe9c7c5c21696bd4e288094c44eef0
-
SHA256
ef0b62c34bac3ea9c196ce4f96ac4aca30d91378dc465abf44a7871aa9e6775a
-
SHA512
76411000d85d8634e1efefd533fac7defb65a7278820c2df64c8b6eb6d92d03f382025afeb5e8a6e99f9de5b8b36a25106b279818c2221fae4c187c5774fd4be
-
T1Happy
T1Happy ransomware is a cryptovirus that behaves different than its counterparts.
-
Disables RegEdit via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Modifies file permissions
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-