General
-
Target
3e035f2d7d30869ce53171ef5a0f761bfb9c14d94d9fe6da385e20b8d96dc2fb.bin.sample
-
Size
71KB
-
Sample
220628-ppntjshddq
-
MD5
d8a44d2ed34b5fee7c8e24d998f805d9
-
SHA1
d8369cb0d8ccec95b2a49ba34aa7749b60998661
-
SHA256
3e035f2d7d30869ce53171ef5a0f761bfb9c14d94d9fe6da385e20b8d96dc2fb
-
SHA512
27974ffb60f4bb726cbc8269257b9485533fa33b3229667f4b7a7019fbd410252a1006df18fcf784cca85d48da277277b552815ee5d23d9f811c263e20d115ac
Static task
static1
Behavioral task
behavioral1
Sample
3e035f2d7d30869ce53171ef5a0f761bfb9c14d94d9fe6da385e20b8d96dc2fb.bin.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3e035f2d7d30869ce53171ef5a0f761bfb9c14d94d9fe6da385e20b8d96dc2fb.bin.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\msocache\# DECRYPT FILES BLUESKY #.txt
http://ccpyeuptrlatb2piua4ukhnhi7lrxgerrcrj4p2b5uhbzqm2xgdjaqid.onion
Extracted
C:\msocache\# DECRYPT FILES BLUESKY #.html
Extracted
C:\Users\Admin\Desktop\# DECRYPT FILES BLUESKY #.html
http://ccpyeuptrlatb2piua4ukhnhi7lrxgerrcrj4p2b5uhbzqm2xgdjaqid.onion
Targets
-
-
Target
3e035f2d7d30869ce53171ef5a0f761bfb9c14d94d9fe6da385e20b8d96dc2fb.bin.sample
-
Size
71KB
-
MD5
d8a44d2ed34b5fee7c8e24d998f805d9
-
SHA1
d8369cb0d8ccec95b2a49ba34aa7749b60998661
-
SHA256
3e035f2d7d30869ce53171ef5a0f761bfb9c14d94d9fe6da385e20b8d96dc2fb
-
SHA512
27974ffb60f4bb726cbc8269257b9485533fa33b3229667f4b7a7019fbd410252a1006df18fcf784cca85d48da277277b552815ee5d23d9f811c263e20d115ac
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-