General
-
Target
400295a3f7672579a747ee9d78dd601e023d1d5fffef4358d1473b82eac6cd92
-
Size
1.1MB
-
Sample
220630-v2df8sdhhp
-
MD5
d0b32bcb0d2d3c809dd829d0b4f5e36f
-
SHA1
ab5f36b7b472ddef8e3cac6be5f077049ff3ac5e
-
SHA256
400295a3f7672579a747ee9d78dd601e023d1d5fffef4358d1473b82eac6cd92
-
SHA512
ab419e43993933ced909da2641e7d4cc02bc8f54c47e60e172b5d9f76d04f8dd4440e7ff4a810549a5c1ac103364eee663c03736335ae2c51a0926ef1b6c7231
Static task
static1
Behavioral task
behavioral1
Sample
400295a3f7672579a747ee9d78dd601e023d1d5fffef4358d1473b82eac6cd92.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
400295a3f7672579a747ee9d78dd601e023d1d5fffef4358d1473b82eac6cd92.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\README1.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README2.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README3.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README4.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README5.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README6.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README7.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README8.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README9.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README10.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Targets
-
-
Target
400295a3f7672579a747ee9d78dd601e023d1d5fffef4358d1473b82eac6cd92
-
Size
1.1MB
-
MD5
d0b32bcb0d2d3c809dd829d0b4f5e36f
-
SHA1
ab5f36b7b472ddef8e3cac6be5f077049ff3ac5e
-
SHA256
400295a3f7672579a747ee9d78dd601e023d1d5fffef4358d1473b82eac6cd92
-
SHA512
ab419e43993933ced909da2641e7d4cc02bc8f54c47e60e172b5d9f76d04f8dd4440e7ff4a810549a5c1ac103364eee663c03736335ae2c51a0926ef1b6c7231
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-