General
-
Target
ba1af457a27bc747747f601c62182ff7e3d773239612ac7a4ddf5f25868340b5
-
Size
953KB
-
Sample
220731-f19qqaade5
-
MD5
f75b295f7d9cb8a93f52056d40f33215
-
SHA1
c1c0f50ed18d44e5a830ab32d6f3eab81ce16c01
-
SHA256
ba1af457a27bc747747f601c62182ff7e3d773239612ac7a4ddf5f25868340b5
-
SHA512
239bb8c2a432f9c7a9f8f9d1313368954c02fce87b544e0f12195367065ad656f8659002493e72f381dbff34b072e5a6d11e8d658f6e64519f2b99b285c186bb
Static task
static1
Behavioral task
behavioral1
Sample
ba1af457a27bc747747f601c62182ff7e3d773239612ac7a4ddf5f25868340b5.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
ba1af457a27bc747747f601c62182ff7e3d773239612ac7a4ddf5f25868340b5.exe
Resource
win10v2004-20220722-en
Malware Config
Extracted
C:\README1.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README2.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README3.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README4.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README5.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README6.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README7.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README8.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README9.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README10.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Targets
-
-
Target
ba1af457a27bc747747f601c62182ff7e3d773239612ac7a4ddf5f25868340b5
-
Size
953KB
-
MD5
f75b295f7d9cb8a93f52056d40f33215
-
SHA1
c1c0f50ed18d44e5a830ab32d6f3eab81ce16c01
-
SHA256
ba1af457a27bc747747f601c62182ff7e3d773239612ac7a4ddf5f25868340b5
-
SHA512
239bb8c2a432f9c7a9f8f9d1313368954c02fce87b544e0f12195367065ad656f8659002493e72f381dbff34b072e5a6d11e8d658f6e64519f2b99b285c186bb
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-