General
-
Target
1957c3be12da913243a370f30e478579daa0ef966577c0eac23f9da581cb5ad6.bin
-
Size
413KB
-
Sample
220627-mge6bsadgk
-
MD5
73ba54e1bf3cef8f2a46bbc2ed73cfb9
-
SHA1
3c9587ea9dc8039735398548fbc17ee50cf1b8b7
-
SHA256
1957c3be12da913243a370f30e478579daa0ef966577c0eac23f9da581cb5ad6
-
SHA512
e71eb7e2afe93855e448f270c3e8847ac7d46865cbd2d106de9b39567a163af0059c8ff8889a3dfe1b4c717f90f7f483e48fb421c3ea1bc9f6608be8edad950a
Static task
static1
Behavioral task
behavioral1
Sample
1957c3be12da913243a370f30e478579daa0ef966577c0eac23f9da581cb5ad6.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1957c3be12da913243a370f30e478579daa0ef966577c0eac23f9da581cb5ad6.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\How To Restore Your Files.txt
https://bisq.network/
https://www.getmonero.org/
Targets
-
-
Target
1957c3be12da913243a370f30e478579daa0ef966577c0eac23f9da581cb5ad6.bin
-
Size
413KB
-
MD5
73ba54e1bf3cef8f2a46bbc2ed73cfb9
-
SHA1
3c9587ea9dc8039735398548fbc17ee50cf1b8b7
-
SHA256
1957c3be12da913243a370f30e478579daa0ef966577c0eac23f9da581cb5ad6
-
SHA512
e71eb7e2afe93855e448f270c3e8847ac7d46865cbd2d106de9b39567a163af0059c8ff8889a3dfe1b4c717f90f7f483e48fb421c3ea1bc9f6608be8edad950a
Score10/10-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-