General
-
Target
enc (1).zip
-
Size
2.8MB
-
Sample
220629-nh7seahbap
-
MD5
9df3d2d1096f43068eece8dde8524346
-
SHA1
28be128c31966c5ca361e790d2bdd16f957e2805
-
SHA256
8b02927265e5ec4e7da20d1a45187ed80fcc5a8de9c2bef830eeb844b395a786
-
SHA512
296ce6f5fa82c762390019def058193a81fe44305041087e13bc171160769c77c59ab8fb0d12d8534777fa6d6ea50619062a25bde56788123475034c6c903c59
Static task
static1
Behavioral task
behavioral1
Sample
enc.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
enc.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\\OnHnnBvUej-RECOVER-README.txt
Targets
-
-
Target
enc.exe
-
Size
7.7MB
-
MD5
a7ab0969bf6641cd0c7228ae95f6d217
-
SHA1
002971b6d178698bf7930b5b89c201750d80a07e
-
SHA256
117fc30c25b1f28cd923b530ab9f91a0a818925b0b89b8bc9a7f820a9e630464
-
SHA512
7e1cce428e3b80b60635c354801af6e86354c9437ba7a661ca6a922c17057a16439a97d1ea11873eb359c05018df9eb6040b72fa97b30cf4d04cae56bf052b8a
Score10/10-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-