General
-
Target
4b5fe7497864d07f78af15fa3e1aa3702b303b89f9644624871d83dd0f484749.exe
-
Size
139KB
-
Sample
220830-2nbh2sedf7
-
MD5
24275604649ac0abafe99b981b914fbc
-
SHA1
818b0e3018ad27be9887e9e5f4ef1971f422652c
-
SHA256
4b5fe7497864d07f78af15fa3e1aa3702b303b89f9644624871d83dd0f484749
-
SHA512
008ef045724963d6ae3b845a6c3de8ebb6682b0f4b8ea77c2d35e2193596b78f0092183de0a88a34f7dde4e71abbc129b2f0f00fd8469801fff66f1b8390b6c8
-
SSDEEP
1536:JLMVCWvZ8URtqOz3d+1Qs6H9Mk2e3E2avMWC3yMgYxf6+okbdWsWjcdpKCaIxWzX:VM9ntZ3s1QJdnU2SQdf64ZZ8CaIxWec
Behavioral task
behavioral1
Sample
4b5fe7497864d07f78af15fa3e1aa3702b303b89f9644624871d83dd0f484749.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4b5fe7497864d07f78af15fa3e1aa3702b303b89f9644624871d83dd0f484749.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\NFTHN-DECRYPT.txt
http://gandcrabmfe6mnef.onion/5c0f9ce89d2ef5f7
Extracted
C:\RSAHIYV-DECRYPT.txt
http://gandcrabmfe6mnef.onion/c3f423cdbe44ce6f
Targets
-
-
Target
4b5fe7497864d07f78af15fa3e1aa3702b303b89f9644624871d83dd0f484749.exe
-
Size
139KB
-
MD5
24275604649ac0abafe99b981b914fbc
-
SHA1
818b0e3018ad27be9887e9e5f4ef1971f422652c
-
SHA256
4b5fe7497864d07f78af15fa3e1aa3702b303b89f9644624871d83dd0f484749
-
SHA512
008ef045724963d6ae3b845a6c3de8ebb6682b0f4b8ea77c2d35e2193596b78f0092183de0a88a34f7dde4e71abbc129b2f0f00fd8469801fff66f1b8390b6c8
-
SSDEEP
1536:JLMVCWvZ8URtqOz3d+1Qs6H9Mk2e3E2avMWC3yMgYxf6+okbdWsWjcdpKCaIxWzX:VM9ntZ3s1QJdnU2SQdf64ZZ8CaIxWec
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-