General
-
Target
3d24fdfe25be5439de389d46c00ef6bcdd7bed50a85c573c489b5f12c506b8b5
-
Size
230KB
-
Sample
220703-en4hhagdg5
-
MD5
9734cd0bc2ffc92b17ffa2dccaaedab1
-
SHA1
c2c851d95135f86884cc99917503973c17995518
-
SHA256
3d24fdfe25be5439de389d46c00ef6bcdd7bed50a85c573c489b5f12c506b8b5
-
SHA512
38b6391db917c6aa3ad2d834fd366d1b3874ee188fd0c7bb6ef96541d35325fea9e916fd64e822188d3ab4bbce9efaf844633c61a28833ecb7ca5ba211df0ccb
Static task
static1
Behavioral task
behavioral1
Sample
3d24fdfe25be5439de389d46c00ef6bcdd7bed50a85c573c489b5f12c506b8b5.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3d24fdfe25be5439de389d46c00ef6bcdd7bed50a85c573c489b5f12c506b8b5.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Restore-My-Files.txt
http://decrmbgpvh6kvmti.onion/
http://helpinfh6vj47ift.onion/
Extracted
C:\Restore-My-Files.txt
http://decrmbgpvh6kvmti.onion/
http://helpinfh6vj47ift.onion/
Targets
-
-
Target
3d24fdfe25be5439de389d46c00ef6bcdd7bed50a85c573c489b5f12c506b8b5
-
Size
230KB
-
MD5
9734cd0bc2ffc92b17ffa2dccaaedab1
-
SHA1
c2c851d95135f86884cc99917503973c17995518
-
SHA256
3d24fdfe25be5439de389d46c00ef6bcdd7bed50a85c573c489b5f12c506b8b5
-
SHA512
38b6391db917c6aa3ad2d834fd366d1b3874ee188fd0c7bb6ef96541d35325fea9e916fd64e822188d3ab4bbce9efaf844633c61a28833ecb7ca5ba211df0ccb
Score10/10-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-