General
-
Target
ewin.exe
-
Size
79KB
-
Sample
220628-m63mxsagf5
-
MD5
b1506fec2b3988ff33fb5e6c5076439d
-
SHA1
295b9010c3eb13496b3a1379e73c5d2317c2134d
-
SHA256
3a64d8f4f91013a46b8114092a5d691a93a9e559be43f9f7b4ceb3bd6a1a1876
-
SHA512
104d342628253247aff4edbc9b3d801c69d89de9f16045055575d8ddf5b80a15e9a3bfcfaec5667035a30c5809eca57286be748c3d775fc4dc1be51c39642323
Static task
static1
Behavioral task
behavioral1
Sample
ewin.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ewin.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
ewin.exe
-
Size
79KB
-
MD5
b1506fec2b3988ff33fb5e6c5076439d
-
SHA1
295b9010c3eb13496b3a1379e73c5d2317c2134d
-
SHA256
3a64d8f4f91013a46b8114092a5d691a93a9e559be43f9f7b4ceb3bd6a1a1876
-
SHA512
104d342628253247aff4edbc9b3d801c69d89de9f16045055575d8ddf5b80a15e9a3bfcfaec5667035a30c5809eca57286be748c3d775fc4dc1be51c39642323
Score9/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-