General
-
Target
sample-604995-339165f63aec8d7fd7798129d0fc68ad.zip
-
Size
229KB
-
Sample
220525-2rm19aefd9
-
MD5
84d2df993ecc1d772411758180a426db
-
SHA1
323f84604434cd4f120e1b938aa113e7dff5106b
-
SHA256
8880aa3c00150fb4a6745b59b33c71dd6246b61309e81a15d8f6350616adfbd9
-
SHA512
8675e1e4471dfc23b02351b918ac0993e0c1cecde53e6fb70f3816f0b93fec88f6988e965c51bd9f7b8fbc1620f36bf91ae296c1bcc8680e53099d99604a7b4f
Static task
static1
Behavioral task
behavioral1
Sample
W71my1HtQm.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
W71my1HtQm.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
mespinoza
-
ransomnote
Hi Company, Every byte on any types of your devices was encrypted. Don't try to use backups because it were encrypted too. To get all your data back contact us: [email protected] [email protected] -------------- FAQ: 1. Q: How can I make sure you don't fooling me? A: You can send us 2 files(max 2mb). 2. Q: What to do to get all data back? A: Don't restart the computer, don't move files and write us. 3. Q: What to tell my boss? A: Protect Your System Amigo.
Targets
-
-
Target
W71my1HtQm.exe
-
Size
499KB
-
MD5
339165f63aec8d7fd7798129d0fc68ad
-
SHA1
07f594333ca9db110bbee37a9643988f4cc22933
-
SHA256
0f0014669bc10a7d87472cafc05301c66516857607b920ddeb3039f4cb8f0a50
-
SHA512
5ef9dbe0f29397adf00f0c4ace8f90fd0aba9a0c2016cecff02f68bcef5781bc5dcd32c18d9b54cc8025581ec6494990dd472cdd36c394637799907e5cc55e3b
Score10/10-
Mespinoza Ransomware
Also known as Pysa. Ransomware-as-a-servoce which first appeared in 2020.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-