General
-
Target
z7w3x.exe
-
Size
621KB
-
Sample
220601-rjzpzacfhn
-
MD5
753585e5e099b192cf8d7593dd5ef4bf
-
SHA1
68c5d6b38c9dd9e9e1e888386025352811147028
-
SHA256
e26b2ffb2ee711fc7b04d62911580560794ee4fa9b7fcfade65ee6ff2eed0274
-
SHA512
de96554eaa3971672f05228d26fc6cbe98c8a5b31d35b21c92256c4dfee24ec81a708d601e0be4b80a0a365f620e4b0582f6fcc950f29df2ed6233c8314494ce
Static task
static1
Behavioral task
behavioral1
Sample
z7w3x.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
z7w3x.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\Horse.txt
https://icq.com/windows/
https://icq.im/HORSEMAGYAR
Extracted
C:\Users\Admin\AppData\Local\Temp\Horse.txt
https://icq.com/windows/
https://icq.im/HORSEMAGYAR
Targets
-
-
Target
z7w3x.exe
-
Size
621KB
-
MD5
753585e5e099b192cf8d7593dd5ef4bf
-
SHA1
68c5d6b38c9dd9e9e1e888386025352811147028
-
SHA256
e26b2ffb2ee711fc7b04d62911580560794ee4fa9b7fcfade65ee6ff2eed0274
-
SHA512
de96554eaa3971672f05228d26fc6cbe98c8a5b31d35b21c92256c4dfee24ec81a708d601e0be4b80a0a365f620e4b0582f6fcc950f29df2ed6233c8314494ce
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Modifies file permissions
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-