General
-
Target
e3d6d045380162b7c6f71def8ba6aa8bd1c846db2095e7c1d9fc127970dfac08.bin
-
Size
1.9MB
-
Sample
220720-n2w51sfear
-
MD5
49d4bdfa882c8458b86b1e4a5e79c92d
-
SHA1
6c4c9f61119fdc3d9c31e11f9cef3b0902b81884
-
SHA256
e3d6d045380162b7c6f71def8ba6aa8bd1c846db2095e7c1d9fc127970dfac08
-
SHA512
08313dba9dfa4d3432a374a48e1ad487030c7017947050895f87549efd0545e8df18c00d42aa8a7625d827861a3ab074bf6d104821cb4632e88c43c174c59e57
Behavioral task
behavioral1
Sample
e3d6d045380162b7c6f71def8ba6aa8bd1c846db2095e7c1d9fc127970dfac08.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
e3d6d045380162b7c6f71def8ba6aa8bd1c846db2095e7c1d9fc127970dfac08.exe
Resource
win10v2004-20220718-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\HOW-TO-DECRYPT-kgkq9.txt
Extracted
C:\Users\Admin\Desktop\HOW-TO-DECRYPT-kgkq9.txt
Targets
-
-
Target
e3d6d045380162b7c6f71def8ba6aa8bd1c846db2095e7c1d9fc127970dfac08.bin
-
Size
1.9MB
-
MD5
49d4bdfa882c8458b86b1e4a5e79c92d
-
SHA1
6c4c9f61119fdc3d9c31e11f9cef3b0902b81884
-
SHA256
e3d6d045380162b7c6f71def8ba6aa8bd1c846db2095e7c1d9fc127970dfac08
-
SHA512
08313dba9dfa4d3432a374a48e1ad487030c7017947050895f87549efd0545e8df18c00d42aa8a7625d827861a3ab074bf6d104821cb4632e88c43c174c59e57
Score10/10-
Hades Ransomware
Ransomware family attributed to Evil Corp APT first seen in late 2020.
-
Hades payload
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Loads dropped DLL
-