General
-
Target
361bd552b278cf0d956b787abd984b6c86413d668492613782f856040d8200a0
-
Size
243KB
-
Sample
220626-d6cbasfeem
-
MD5
e222299ef243f72a0d45db64601146d3
-
SHA1
e87bdc834dddd85b5b9b931eaccac03a5caabf81
-
SHA256
361bd552b278cf0d956b787abd984b6c86413d668492613782f856040d8200a0
-
SHA512
683c5879edd98b9ed0b71c11bfc0857b2fe2a240d73105e78600c24352c094ceb0cdb6eb78fe22a721d4d1946c034afc0d0240b61f62038a5fd4c1bfb80dae14
Static task
static1
Behavioral task
behavioral1
Sample
361bd552b278cf0d956b787abd984b6c86413d668492613782f856040d8200a0.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
361bd552b278cf0d956b787abd984b6c86413d668492613782f856040d8200a0.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Restore-My-Files.txt
http://decrmbgpvh6kvmti.onion/
http://helpinfh6vj47ift.onion/
Extracted
C:\Restore-My-Files.txt
http://decrmbgpvh6kvmti.onion/
http://helpinfh6vj47ift.onion/
Targets
-
-
Target
361bd552b278cf0d956b787abd984b6c86413d668492613782f856040d8200a0
-
Size
243KB
-
MD5
e222299ef243f72a0d45db64601146d3
-
SHA1
e87bdc834dddd85b5b9b931eaccac03a5caabf81
-
SHA256
361bd552b278cf0d956b787abd984b6c86413d668492613782f856040d8200a0
-
SHA512
683c5879edd98b9ed0b71c11bfc0857b2fe2a240d73105e78600c24352c094ceb0cdb6eb78fe22a721d4d1946c034afc0d0240b61f62038a5fd4c1bfb80dae14
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-