General
-
Target
56b77a9c4d7a6359e9d813917c213dd40c571248bf040da37d76dd6227084033
-
Size
224KB
-
Sample
220725-ccl3zaabdr
-
MD5
3a046235da60ec107f4daa600bd7f6ca
-
SHA1
e07bf29a180c497224c798752b18bf7fcfc9ef3f
-
SHA256
56b77a9c4d7a6359e9d813917c213dd40c571248bf040da37d76dd6227084033
-
SHA512
6b2b40a600b5c5f1056e1b1b9750dd5375a39a0c7030fa5a1fad1584920c2be46427e6ec541eab6a1fdd9f8c604e83ee004fc630d4a23b93f8e1b2d5fcdd5e87
Static task
static1
Behavioral task
behavioral1
Sample
56b77a9c4d7a6359e9d813917c213dd40c571248bf040da37d76dd6227084033.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
56b77a9c4d7a6359e9d813917c213dd40c571248bf040da37d76dd6227084033.exe
Resource
win10v2004-20220722-en
Malware Config
Extracted
C:\Restore-My-Files.txt
http://decrmbgpvh6kvmti.onion/
http://helpinfh6vj47ift.onion/
Extracted
C:\Restore-My-Files.txt
http://decrmbgpvh6kvmti.onion/
http://helpinfh6vj47ift.onion/
Targets
-
-
Target
56b77a9c4d7a6359e9d813917c213dd40c571248bf040da37d76dd6227084033
-
Size
224KB
-
MD5
3a046235da60ec107f4daa600bd7f6ca
-
SHA1
e07bf29a180c497224c798752b18bf7fcfc9ef3f
-
SHA256
56b77a9c4d7a6359e9d813917c213dd40c571248bf040da37d76dd6227084033
-
SHA512
6b2b40a600b5c5f1056e1b1b9750dd5375a39a0c7030fa5a1fad1584920c2be46427e6ec541eab6a1fdd9f8c604e83ee004fc630d4a23b93f8e1b2d5fcdd5e87
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-