General
-
Target
215afd5082700778508aef3e9d40b242206dab74801a1d13d3a59dbb1168dfbf
-
Size
256KB
-
Sample
220612-kr5gvsadd5
-
MD5
18110f51034492e14fc11dc9afa19d46
-
SHA1
efa6ac306cbb3dcea1d4082bc17feb6e17957e4b
-
SHA256
215afd5082700778508aef3e9d40b242206dab74801a1d13d3a59dbb1168dfbf
-
SHA512
5c6cc348f4d64b561aab2bdce05d9b5c71907044562c6950c480d37b7691ace9f3d9ca74e64971d77e46bb009cc1c7566a92f58443af0b65811c94d210965594
Static task
static1
Behavioral task
behavioral1
Sample
215afd5082700778508aef3e9d40b242206dab74801a1d13d3a59dbb1168dfbf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
215afd5082700778508aef3e9d40b242206dab74801a1d13d3a59dbb1168dfbf.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Restore-My-Files.txt
http://decrmbgpvh6kvmti.onion/
http://helpinfh6vj47ift.onion/
Targets
-
-
Target
215afd5082700778508aef3e9d40b242206dab74801a1d13d3a59dbb1168dfbf
-
Size
256KB
-
MD5
18110f51034492e14fc11dc9afa19d46
-
SHA1
efa6ac306cbb3dcea1d4082bc17feb6e17957e4b
-
SHA256
215afd5082700778508aef3e9d40b242206dab74801a1d13d3a59dbb1168dfbf
-
SHA512
5c6cc348f4d64b561aab2bdce05d9b5c71907044562c6950c480d37b7691ace9f3d9ca74e64971d77e46bb009cc1c7566a92f58443af0b65811c94d210965594
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-